Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Xzm9fAfKhB.exe

Overview

General Information

Sample name:Xzm9fAfKhB.exe
renamed because original name is a hash value
Original sample name:d9cd9f798cb8012ce2834ac5e21ed371.exe
Analysis ID:1524740
MD5:d9cd9f798cb8012ce2834ac5e21ed371
SHA1:a6879cd6c787a50e5f0168ecf6caddc4a0b4a822
SHA256:e91f69194702e3b8568ba1c3db43fd187118e1fdabfb6eaef764feff8057c608
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Xzm9fAfKhB.exe (PID: 4800 cmdline: "C:\Users\user\Desktop\Xzm9fAfKhB.exe" MD5: D9CD9F798CB8012CE2834AC5E21ED371)
    • Xzm9fAfKhB.tmp (PID: 64 cmdline: "C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp" /SL5="$203DC,8066431,54272,C:\Users\user\Desktop\Xzm9fAfKhB.exe" MD5: 16C9D19AB32C18671706CEFEE19B6949)
      • zextervideocodec32_64.exe (PID: 6236 cmdline: "C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe" -i MD5: 96504F6C70AD91FDC3D32BF7C3FA2696)
  • cleanup
{"C2 list": ["ebirbqi.ua"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000003.00000002.3386241526.0000000002BB0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: zextervideocodec32_64.exe PID: 6236JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-03T08:40:03.557729+020020494671A Network Trojan was detected192.168.2.649719185.208.158.24880TCP
        2024-10-03T08:40:03.909597+020020494671A Network Trojan was detected192.168.2.649719185.208.158.24880TCP
        2024-10-03T08:40:04.779447+020020494671A Network Trojan was detected192.168.2.649720185.208.158.24880TCP
        2024-10-03T08:40:05.143029+020020494671A Network Trojan was detected192.168.2.649720185.208.158.24880TCP
        2024-10-03T08:40:05.951562+020020494671A Network Trojan was detected192.168.2.649721185.208.158.24880TCP
        2024-10-03T08:40:06.298863+020020494671A Network Trojan was detected192.168.2.649721185.208.158.24880TCP
        2024-10-03T08:40:06.641793+020020494671A Network Trojan was detected192.168.2.649721185.208.158.24880TCP
        2024-10-03T08:40:08.480326+020020494671A Network Trojan was detected192.168.2.649722185.208.158.24880TCP
        2024-10-03T08:40:09.298643+020020494671A Network Trojan was detected192.168.2.649723185.208.158.24880TCP
        2024-10-03T08:40:09.646073+020020494671A Network Trojan was detected192.168.2.649723185.208.158.24880TCP
        2024-10-03T08:40:10.475796+020020494671A Network Trojan was detected192.168.2.649725185.208.158.24880TCP
        2024-10-03T08:40:11.291408+020020494671A Network Trojan was detected192.168.2.649726185.208.158.24880TCP
        2024-10-03T08:40:12.100767+020020494671A Network Trojan was detected192.168.2.649727185.208.158.24880TCP
        2024-10-03T08:40:13.668740+020020494671A Network Trojan was detected192.168.2.649728185.208.158.24880TCP
        2024-10-03T08:40:14.021882+020020494671A Network Trojan was detected192.168.2.649728185.208.158.24880TCP
        2024-10-03T08:40:14.854908+020020494671A Network Trojan was detected192.168.2.649729185.208.158.24880TCP
        2024-10-03T08:40:15.683032+020020494671A Network Trojan was detected192.168.2.649730185.208.158.24880TCP
        2024-10-03T08:40:16.486986+020020494671A Network Trojan was detected192.168.2.649731185.208.158.24880TCP
        2024-10-03T08:40:16.829817+020020494671A Network Trojan was detected192.168.2.649731185.208.158.24880TCP
        2024-10-03T08:40:17.173081+020020494671A Network Trojan was detected192.168.2.649731185.208.158.24880TCP
        2024-10-03T08:40:18.004594+020020494671A Network Trojan was detected192.168.2.649732185.208.158.24880TCP
        2024-10-03T08:40:18.836718+020020494671A Network Trojan was detected192.168.2.649733185.208.158.24880TCP
        2024-10-03T08:40:19.657844+020020494671A Network Trojan was detected192.168.2.649734185.208.158.24880TCP
        2024-10-03T08:40:20.004208+020020494671A Network Trojan was detected192.168.2.649734185.208.158.24880TCP
        2024-10-03T08:40:20.809757+020020494671A Network Trojan was detected192.168.2.649735185.208.158.24880TCP
        2024-10-03T08:40:21.156403+020020494671A Network Trojan was detected192.168.2.649735185.208.158.24880TCP
        2024-10-03T08:40:21.502908+020020494671A Network Trojan was detected192.168.2.649735185.208.158.24880TCP
        2024-10-03T08:40:22.341955+020020494671A Network Trojan was detected192.168.2.649736185.208.158.24880TCP
        2024-10-03T08:40:22.693294+020020494671A Network Trojan was detected192.168.2.649736185.208.158.24880TCP
        2024-10-03T08:40:23.674627+020020494671A Network Trojan was detected192.168.2.649737185.208.158.24880TCP
        2024-10-03T08:40:24.482732+020020494671A Network Trojan was detected192.168.2.649738185.208.158.24880TCP
        2024-10-03T08:40:24.980157+020020494671A Network Trojan was detected192.168.2.649738185.208.158.24880TCP
        2024-10-03T08:40:25.798356+020020494671A Network Trojan was detected192.168.2.649739185.208.158.24880TCP
        2024-10-03T08:40:26.606860+020020494671A Network Trojan was detected192.168.2.649740185.208.158.24880TCP
        2024-10-03T08:40:26.953733+020020494671A Network Trojan was detected192.168.2.649740185.208.158.24880TCP
        2024-10-03T08:40:27.298083+020020494671A Network Trojan was detected192.168.2.649740185.208.158.24880TCP
        2024-10-03T08:40:27.641462+020020494671A Network Trojan was detected192.168.2.649740185.208.158.24880TCP
        2024-10-03T08:40:28.465099+020020494671A Network Trojan was detected192.168.2.649741185.208.158.24880TCP
        2024-10-03T08:40:30.265711+020020494671A Network Trojan was detected192.168.2.649742185.208.158.24880TCP
        2024-10-03T08:40:31.104830+020020494671A Network Trojan was detected192.168.2.649743185.208.158.24880TCP
        2024-10-03T08:40:32.078905+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:32.454570+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:32.798274+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:33.141264+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:33.485451+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:33.834878+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:34.298286+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:34.648536+020020494671A Network Trojan was detected192.168.2.649744185.208.158.24880TCP
        2024-10-03T08:40:35.454533+020020494671A Network Trojan was detected192.168.2.649745185.208.158.24880TCP
        2024-10-03T08:40:35.798624+020020494671A Network Trojan was detected192.168.2.649745185.208.158.24880TCP
        2024-10-03T08:40:36.145125+020020494671A Network Trojan was detected192.168.2.649745185.208.158.24880TCP
        2024-10-03T08:40:36.957264+020020494671A Network Trojan was detected192.168.2.649746185.208.158.24880TCP
        2024-10-03T08:40:37.775736+020020494671A Network Trojan was detected192.168.2.649748185.208.158.24880TCP
        2024-10-03T08:40:38.577743+020020494671A Network Trojan was detected192.168.2.649749185.208.158.24880TCP
        2024-10-03T08:40:38.922676+020020494671A Network Trojan was detected192.168.2.649749185.208.158.24880TCP
        2024-10-03T08:40:39.790336+020020494671A Network Trojan was detected192.168.2.649750185.208.158.24880TCP
        2024-10-03T08:40:40.601299+020020494671A Network Trojan was detected192.168.2.649751185.208.158.24880TCP
        2024-10-03T08:40:41.422965+020020494671A Network Trojan was detected192.168.2.649752185.208.158.24880TCP
        2024-10-03T08:40:41.770339+020020494671A Network Trojan was detected192.168.2.649752185.208.158.24880TCP
        2024-10-03T08:40:42.584993+020020494671A Network Trojan was detected192.168.2.649753185.208.158.24880TCP
        2024-10-03T08:40:43.426932+020020494671A Network Trojan was detected192.168.2.649754185.208.158.24880TCP
        2024-10-03T08:40:44.232887+020020494671A Network Trojan was detected192.168.2.649755185.208.158.24880TCP
        2024-10-03T08:40:44.580361+020020494671A Network Trojan was detected192.168.2.649755185.208.158.24880TCP
        2024-10-03T08:40:44.974483+020020494671A Network Trojan was detected192.168.2.649755185.208.158.24880TCP
        2024-10-03T08:40:45.788468+020020494671A Network Trojan was detected192.168.2.649756185.208.158.24880TCP
        2024-10-03T08:40:46.620773+020020494671A Network Trojan was detected192.168.2.649757185.208.158.24880TCP
        2024-10-03T08:40:47.429110+020020494671A Network Trojan was detected192.168.2.649758185.208.158.24880TCP
        2024-10-03T08:40:48.250966+020020494671A Network Trojan was detected192.168.2.649759185.208.158.24880TCP
        2024-10-03T08:40:48.821744+020020494671A Network Trojan was detected192.168.2.649759185.208.158.24880TCP
        2024-10-03T08:40:49.636214+020020494671A Network Trojan was detected192.168.2.649760185.208.158.24880TCP
        2024-10-03T08:40:50.436319+020020494671A Network Trojan was detected192.168.2.649761185.208.158.24880TCP
        2024-10-03T08:40:50.782549+020020494671A Network Trojan was detected192.168.2.649761185.208.158.24880TCP
        2024-10-03T08:40:51.125825+020020494671A Network Trojan was detected192.168.2.649761185.208.158.24880TCP
        2024-10-03T08:40:51.469860+020020494671A Network Trojan was detected192.168.2.649761185.208.158.24880TCP
        2024-10-03T08:40:52.430506+020020494671A Network Trojan was detected192.168.2.649762185.208.158.24880TCP
        2024-10-03T08:40:53.235582+020020494671A Network Trojan was detected192.168.2.649763185.208.158.24880TCP
        2024-10-03T08:40:53.580693+020020494671A Network Trojan was detected192.168.2.649763185.208.158.24880TCP
        2024-10-03T08:40:53.923676+020020494671A Network Trojan was detected192.168.2.649763185.208.158.24880TCP
        2024-10-03T08:40:54.270652+020020494671A Network Trojan was detected192.168.2.649763185.208.158.24880TCP
        2024-10-03T08:40:55.079309+020020494671A Network Trojan was detected192.168.2.649764185.208.158.24880TCP
        2024-10-03T08:40:55.913022+020020494671A Network Trojan was detected192.168.2.649765185.208.158.24880TCP
        2024-10-03T08:40:56.727880+020020494671A Network Trojan was detected192.168.2.649766185.208.158.24880TCP
        2024-10-03T08:40:57.530444+020020494671A Network Trojan was detected192.168.2.649767185.208.158.24880TCP
        2024-10-03T08:40:58.436463+020020494671A Network Trojan was detected192.168.2.649768185.208.158.24880TCP
        2024-10-03T08:40:59.085837+020020494671A Network Trojan was detected192.168.2.649768185.208.158.24880TCP
        2024-10-03T08:40:59.908301+020020494671A Network Trojan was detected192.168.2.649769185.208.158.24880TCP
        2024-10-03T08:41:00.252946+020020494671A Network Trojan was detected192.168.2.649769185.208.158.24880TCP
        2024-10-03T08:41:01.124506+020020494671A Network Trojan was detected192.168.2.649770185.208.158.24880TCP
        2024-10-03T08:41:02.734317+020020494671A Network Trojan was detected192.168.2.649771185.208.158.24880TCP
        2024-10-03T08:41:03.541913+020020494671A Network Trojan was detected192.168.2.649772185.208.158.24880TCP
        2024-10-03T08:41:04.363758+020020494671A Network Trojan was detected192.168.2.649773185.208.158.24880TCP
        2024-10-03T08:41:05.280891+020020494671A Network Trojan was detected192.168.2.649774185.208.158.24880TCP
        2024-10-03T08:41:07.092124+020020494671A Network Trojan was detected192.168.2.649775185.208.158.24880TCP
        2024-10-03T08:41:07.959005+020020494671A Network Trojan was detected192.168.2.649776185.208.158.24880TCP
        2024-10-03T08:41:09.318273+020020494671A Network Trojan was detected192.168.2.649777185.208.158.24880TCP
        2024-10-03T08:41:10.152657+020020494671A Network Trojan was detected192.168.2.649778185.208.158.24880TCP
        2024-10-03T08:41:10.994314+020020494671A Network Trojan was detected192.168.2.649780185.208.158.24880TCP
        2024-10-03T08:41:11.825886+020020494671A Network Trojan was detected192.168.2.649781185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: zextervideocodec32_64.exe.6236.3.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["ebirbqi.ua"]}
        Source: Xzm9fAfKhB.exeReversingLabs: Detection: 23%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\EMAIL Safe Storage 10.2.46\EMAIL Safe Storage 10.2.46.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D4EC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0045D5A0 ArcFourCrypt,1_2_0045D5A0
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0045D5B8 ArcFourCrypt,1_2_0045D5B8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeUnpacked PE file: 3.2.zextervideocodec32_64.exe.400000.0.unpack
        Source: Xzm9fAfKhB.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Zexter Video Codec_is1Jump to behavior
        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: Xzm9fAfKhB.tmp, 00000001.00000003.2133608931.000000000214C000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2133698100.0000000003110000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3386168549.0000000003103000.00000002.00000001.01000000.00000006.sdmp, _isdecmp.dll.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49730 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49764 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49723 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49749 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49725 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49772 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49734 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49740 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49742 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49741 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49726 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49731 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49771 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49720 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49745 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49762 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49765 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49743 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49727 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49719 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49752 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49770 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49758 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49722 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49748 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49763 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49744 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49777 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49728 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49778 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49757 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49773 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49732 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49746 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49729 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49737 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49760 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49766 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49721 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49733 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49755 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49751 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49735 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49736 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49775 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49756 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49776 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49781 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49738 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49761 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49750 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49759 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49753 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49767 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49754 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49774 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49739 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49768 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49769 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49780 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: ebirbqi.ua
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownUDP traffic detected without corresponding DNS query: 141.98.234.31
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C572AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,3_2_02C572AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1Host: ebirbqi.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: ebirbqi.ua
        Source: zextervideocodec32_64.exe, 00000003.00000002.3387608515.000000000352D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.1
        Source: zextervideocodec32_64.exe, 00000003.00000002.3387901954.00000000035BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86e
        Source: zextervideocodec32_64.exe, 00000003.00000002.3387998518.0000000003662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://WWW-Authenticate:Proxy-Authenticate:Content-Encoding:gzip1.2.8Content-Length:-/recv
        Source: is-RPNLQ.tmp.1.drString found in binary or memory: http://freedesktop.org
        Source: is-RPNLQ.tmp.1.drString found in binary or memory: http://freedesktop.orgtypenameexeccounttimestampparse_data-
        Source: Xzm9fAfKhB.exe, 00000000.00000002.3383889372.0000000002158000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2131920082.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2134098240.0000000002140000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3383689424.000000000063D000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2137278806.0000000000648000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3384737739.0000000002135000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2133698100.0000000003100000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-CP383.tmp.1.drString found in binary or memory: http://gcc.gnu.org/bugs.html):
        Source: is-0CKRF.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://purl.oclc.org/dsdl/schematron
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://purl.oclc.org/dsdl/schematronpathhttp://www.ascc.net/xml/schematron:node
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://relaxng.org/ns/structure/1.0
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://relaxng.org/ns/structure/1.0definenameincludegrammarxmlRelaxNGParse:
        Source: is-57AK2.tmp.1.drString found in binary or memory: http://tukaani.org/
        Source: is-57AK2.tmp.1.drString found in binary or memory: http://tukaani.org/xz/
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://www.ascc.net/xml/schematron
        Source: is-4QN63.tmp.1.drString found in binary or memory: http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd
        Source: is-RPNLQ.tmp.1.drString found in binary or memory: http://www.freedesktop.org/standards/desktop-bookmarks
        Source: is-RPNLQ.tmp.1.drString found in binary or memory: http://www.freedesktop.org/standards/desktop-bookmarksapplicationgroupapplicationsgroupsprivateiconh
        Source: is-RPNLQ.tmp.1.drString found in binary or memory: http://www.freedesktop.org/standards/shared-mime-info
        Source: Xzm9fAfKhB.exe, 00000000.00000002.3383889372.0000000002158000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2131920082.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2134098240.0000000002140000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3383689424.000000000063D000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2137278806.0000000000648000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3384737739.0000000002135000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2133698100.0000000003100000.00000004.00001000.00020000.00000000.sdmp, is-CFKF2.tmp.1.dr, is-EV29A.tmp.1.dr, is-29IF1.tmp.1.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: Xzm9fAfKhB.tmp, Xzm9fAfKhB.tmp, 00000001.00000000.2132874520.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-14BEA.tmp.1.dr, Xzm9fAfKhB.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd
        Source: is-EHS2H.tmp.1.drString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD
        Source: Xzm9fAfKhB.exe, 00000000.00000003.2132448635.0000000002164000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2132303512.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, Xzm9fAfKhB.tmp, 00000001.00000000.2132874520.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-14BEA.tmp.1.dr, Xzm9fAfKhB.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
        Source: Xzm9fAfKhB.exe, 00000000.00000003.2132448635.0000000002164000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2132303512.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000000.2132874520.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-14BEA.tmp.1.dr, Xzm9fAfKhB.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU

        System Summary

        barindex
        Source: zextervideocodec32_64.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: EMAIL Safe Storage 10.2.46.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0042F530 NtdllDefWindowProc_A,1_2_0042F530
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004789DC NtdllDefWindowProc_A,1_2_004789DC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004573CC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004804C61_2_004804C6
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004709501_2_00470950
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004352D81_2_004352D8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004677101_2_00467710
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0043036C1_2_0043036C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004444D81_2_004444D8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004345D41_2_004345D4
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004866041_2_00486604
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00444A801_2_00444A80
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00430EF81_2_00430EF8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004451781_2_00445178
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0045F4301_2_0045F430
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0045B4D81_2_0045B4D8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004875641_2_00487564
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004455841_2_00445584
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004697701_2_00469770
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0048D8C41_2_0048D8C4
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004519A81_2_004519A8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0043DD601_2_0043DD60
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_031012601_2_03101260
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_03101D201_2_03101D20
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00406C473_2_00406C47
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_004010513_2_00401051
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00401C263_2_00401C26
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C6E22D3_2_02C6E22D
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C5F0503_2_02C5F050
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C74EC93_2_02C74EC9
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C6E6453_2_02C6E645
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C72E543_2_02C72E54
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C69F243_2_02C69F24
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C6ACDA3_2_02C6ACDA
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C684E23_2_02C684E2
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C754403_2_02C75440
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C6DD393_2_02C6DD39
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C8C2AD3_2_02C8C2AD
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C8B4E53_2_02C8B4E5
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp C1769524411682D5A204C8A40F983123C67EFEADB721160E42D7BBFE4531EB70
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_RegDLL.tmp 4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: String function: 02C68B80 appears 37 times
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: String function: 02C753D0 appears 138 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00405964 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00408C14 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00406ACC appears 41 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00403400 appears 61 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00445DE4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 004078FC appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 004344EC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00403494 appears 82 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00457D58 appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00453330 appears 93 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00457B4C appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 00403684 appears 221 times
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: String function: 004460B4 appears 59 times
        Source: Xzm9fAfKhB.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: Xzm9fAfKhB.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: Xzm9fAfKhB.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: Xzm9fAfKhB.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: Xzm9fAfKhB.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-14BEA.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-14BEA.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-14BEA.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-14BEA.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-RPNLQ.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-57AK2.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-PMES9.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-4QN63.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-HQ8HN.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-EULG2.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-H1FDK.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-0CKRF.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-I4ASE.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-BT9F1.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-I5IDJ.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-87RHL.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-UVS9J.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-CFKF2.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: Xzm9fAfKhB.exe, 00000000.00000003.2132448635.0000000002164000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Xzm9fAfKhB.exe
        Source: Xzm9fAfKhB.exe, 00000000.00000003.2132303512.0000000002380000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Xzm9fAfKhB.exe
        Source: Xzm9fAfKhB.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/154@1/1
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C608A0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,3_2_02C608A0
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455DF8
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,3_2_0040D3E8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0046E38C GetVersion,CoCreateInstance,1_2_0046E38C
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00402199 lstrcmpiW,StartServiceCtrlDispatcherA,lstrcmpiW,3_2_00402199
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00402199 lstrcmpiW,StartServiceCtrlDispatcherA,lstrcmpiW,3_2_00402199
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_0040D487 StartServiceCtrlDispatcherA,3_2_0040D487
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00402170 StartServiceCtrlDispatcherA,3_2_00402170
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00402170 StartServiceCtrlDispatcherA,3_2_00402170
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video CodecJump to behavior
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeFile created: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Xzm9fAfKhB.exeReversingLabs: Detection: 23%
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeFile read: C:\Users\user\Desktop\Xzm9fAfKhB.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Xzm9fAfKhB.exe "C:\Users\user\Desktop\Xzm9fAfKhB.exe"
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeProcess created: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp "C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp" /SL5="$203DC,8066431,54272,C:\Users\user\Desktop\Xzm9fAfKhB.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess created: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe "C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe" -i
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeProcess created: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp "C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp" /SL5="$203DC,8066431,54272,C:\Users\user\Desktop\Xzm9fAfKhB.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess created: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe "C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Zexter Video Codec_is1Jump to behavior
        Source: Xzm9fAfKhB.exeStatic file information: File size 8354805 > 1048576
        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: Xzm9fAfKhB.tmp, 00000001.00000003.2133608931.000000000214C000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2133698100.0000000003110000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3386168549.0000000003103000.00000002.00000001.01000000.00000006.sdmp, _isdecmp.dll.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeUnpacked PE file: 3.2.zextervideocodec32_64.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeUnpacked PE file: 3.2.zextervideocodec32_64.exe.400000.0.unpack
        Source: is-EULG2.tmp.1.drStatic PE information: 0x6C5714D0 [Sat Aug 7 13:44:48 2027 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: is-NES8J.tmp.1.drStatic PE information: section name: /4
        Source: is-TL6PF.tmp.1.drStatic PE information: section name: /4
        Source: is-EULG2.tmp.1.drStatic PE information: section name: /4
        Source: is-199CA.tmp.1.drStatic PE information: section name: /4
        Source: is-HQ8HN.tmp.1.drStatic PE information: section name: /4
        Source: is-4QN63.tmp.1.drStatic PE information: section name: /4
        Source: is-5O6A6.tmp.1.drStatic PE information: section name: /4
        Source: is-RPNLQ.tmp.1.drStatic PE information: section name: /4
        Source: is-I7J48.tmp.1.drStatic PE information: section name: /4
        Source: is-87RHL.tmp.1.drStatic PE information: section name: /4
        Source: is-BT9F1.tmp.1.drStatic PE information: section name: /4
        Source: is-CFA55.tmp.1.drStatic PE information: section name: /4
        Source: is-8MT3T.tmp.1.drStatic PE information: section name: /4
        Source: is-OOHEU.tmp.1.drStatic PE information: section name: /4
        Source: is-I4ASE.tmp.1.drStatic PE information: section name: /4
        Source: is-CFKF2.tmp.1.drStatic PE information: section name: /4
        Source: is-7H0OE.tmp.1.drStatic PE information: section name: /4
        Source: is-FOK4M.tmp.1.drStatic PE information: section name: /4
        Source: is-57AK2.tmp.1.drStatic PE information: section name: /4
        Source: is-PMES9.tmp.1.drStatic PE information: section name: /4
        Source: is-H1FDK.tmp.1.drStatic PE information: section name: /4
        Source: is-I5IDJ.tmp.1.drStatic PE information: section name: /4
        Source: is-JCARN.tmp.1.drStatic PE information: section name: /4
        Source: is-UVS9J.tmp.1.drStatic PE information: section name: /4
        Source: is-79FJ7.tmp.1.drStatic PE information: section name: /4
        Source: is-SD4OG.tmp.1.drStatic PE information: section name: /4
        Source: is-TUTT5.tmp.1.drStatic PE information: section name: /4
        Source: is-R7G7O.tmp.1.drStatic PE information: section name: /4
        Source: is-KRQSU.tmp.1.drStatic PE information: section name: /4
        Source: is-CP383.tmp.1.drStatic PE information: section name: /4
        Source: is-3AK63.tmp.1.drStatic PE information: section name: /4
        Source: is-0CKRF.tmp.1.drStatic PE information: section name: /4
        Source: is-EHS2H.tmp.1.drStatic PE information: section name: /4
        Source: is-9NRJ4.tmp.1.drStatic PE information: section name: /4
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00409954 push 00409991h; ret 1_2_00409989
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040A04F push ds; ret 1_2_0040A050
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040A023 push ds; ret 1_2_0040A04D
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00460088 push ecx; mov dword ptr [esp], ecx1_2_0046008C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0049467C push ecx; mov dword ptr [esp], ecx1_2_00494681
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx1_2_004106E5
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx1_2_0040D03A
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004850AC push ecx; mov dword ptr [esp], ecx1_2_004850B1
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00443450 push ecx; mov dword ptr [esp], ecx1_2_00443454
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx1_2_0040F59A
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00459634 push 00459678h; ret 1_2_00459670
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004517E4 push 00451817h; ret 1_2_0045180F
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004519A8 push ecx; mov dword ptr [esp], eax1_2_004519AD
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00483A08 push 00483AF7h; ret 1_2_00483AEF
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00477A24 push ecx; mov dword ptr [esp], edx1_2_00477A25

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_00401A4F
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C5F879
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-RPNLQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-I4ASE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-199CA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgiomm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-8MT3T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-H1FDK.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-I7J48.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-PMES9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-NES8J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-OOHEU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-CFKF2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-EHS2H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-87RHL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-0CKRF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libxml2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-BT9F1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-CP383.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libfreetype-6.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-I5IDJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\uninstall\is-14BEA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-UVS9J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-FOK4M.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-KRQSU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-9NRJ4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-EULG2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libiconv-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-79FJ7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-5O6A6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-TL6PF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-JCARN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libstdc++-6.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgio-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-HQ8HN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-TUTT5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libglib-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-4QN63.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-3AK63.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-SD4OG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-R7G7O.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-57AK2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-7H0OE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\is-CFA55.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpFile created: C:\Users\user\AppData\Local\Zexter Video Codec\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeFile created: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeFile created: C:\ProgramData\EMAIL Safe Storage 10.2.46\EMAIL Safe Storage 10.2.46.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeFile created: C:\ProgramData\EMAIL Safe Storage 10.2.46\EMAIL Safe Storage 10.2.46.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_00401A4F
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C5F879
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_00402199 lstrcmpiW,StartServiceCtrlDispatcherA,lstrcmpiW,3_2_00402199
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004833BC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_00401B4B
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_02C5F97D
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeWindow / User API: threadDelayed 688Jump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeWindow / User API: threadDelayed 9151Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-RPNLQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-I4ASE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-199CA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgiomm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-8MT3T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-H1FDK.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-PMES9.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-I7J48.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-OOHEU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-NES8J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-EHS2H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-CFKF2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-87RHL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-0CKRF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libxml2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-BT9F1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-CP383.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libfreetype-6.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-I5IDJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-UVS9J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\uninstall\is-14BEA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-FOK4M.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-9NRJ4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-KRQSU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-EULG2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libiconv-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-79FJ7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-5O6A6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-TL6PF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-JCARN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libstdc++-6.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgio-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-HQ8HN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-TUTT5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libglib-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-4QN63.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-3AK63.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-SD4OG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-R7G7O.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-57AK2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-7H0OE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\is-CFA55.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Zexter Video Codec\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5694
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-18982
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe TID: 2128Thread sleep count: 688 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe TID: 2128Thread sleep time: -1376000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe TID: 5172Thread sleep count: 83 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe TID: 5172Thread sleep time: -4980000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe TID: 2128Thread sleep count: 9151 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe TID: 2128Thread sleep time: -18302000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeThread delayed: delay time: 60000Jump to behavior
        Source: zextervideocodec32_64.exe, 00000003.00000002.3383403547.0000000000767000.00000004.00000020.00020000.00000000.sdmp, zextervideocodec32_64.exe, 00000003.00000002.3387608515.00000000034F5000.00000004.00000020.00020000.00000000.sdmp, zextervideocodec32_64.exe, 00000003.00000002.3383403547.000000000068E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeAPI call chain: ExitProcess graph end nodegraph_0-6734
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeAPI call chain: ExitProcess graph end nodegraph_3-18984
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeAPI call chain: ExitProcess graph end nodegraph_3-21395
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C7019E RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02C7019E
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C7019E RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02C7019E
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C5648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,3_2_02C5648B
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C69508 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02C69508
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478420
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exeCode function: 3_2_02C6804D cpuid 3_2_02C6804D
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: GetLocaleInfoA,0_2_004051FC
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: GetLocaleInfoA,0_2_00405248
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: GetLocaleInfoA,1_2_00408570
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: GetLocaleInfoA,1_2_004085BC
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_0045892C
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpCode function: 1_2_00455588 GetUserNameA,1_2_00455588
        Source: C:\Users\user\Desktop\Xzm9fAfKhB.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3386241526.0000000002BB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: zextervideocodec32_64.exe PID: 6236, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3386241526.0000000002BB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: zextervideocodec32_64.exe PID: 6236, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        5
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        21
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
        Windows Service
        1
        Timestomp
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture112
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets41
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
        Virtualization/Sandbox Evasion
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Xzm9fAfKhB.exe24%ReversingLabsWin32.Trojan.Munp
        SourceDetectionScannerLabelLink
        C:\ProgramData\EMAIL Safe Storage 10.2.46\EMAIL Safe Storage 10.2.46.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp4%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_isdecmp.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-0CKRF.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-199CA.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-3AK63.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-4QN63.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-57AK2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-5O6A6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-79FJ7.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-7H0OE.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-87RHL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-8MT3T.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-9NRJ4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-BT9F1.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-CFA55.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-CFKF2.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-CP383.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-EHS2H.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-EULG2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-FOK4M.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-H1FDK.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-HQ8HN.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-I4ASE.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-I5IDJ.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-I7J48.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-JCARN.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-KRQSU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-NES8J.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-OOHEU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-PMES9.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-R7G7O.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-RPNLQ.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-SD4OG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-TL6PF.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-TUTT5.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\is-UVS9J.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libfreetype-6.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgcc_s_dw2-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgdk-win32-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgdk_pixbuf-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgdkmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgio-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgiomm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libglib-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libglibmm-2.4-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgmodule-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgobject-2.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgomp-1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libgraphite2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libharfbuzz-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libiconv-2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libintl-8.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libjpeg-8.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\liblcms2-2.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\liblzma-5.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libpango-1.0-0.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Zexter Video Codec\libpangocairo-1.0-0.dll (copy)0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd0%VirustotalBrowse
        http://www.freedesktop.org/standards/desktop-bookmarks0%VirustotalBrowse
        http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD0%VirustotalBrowse
        http://gcc.gnu.org/bugs.html):0%VirustotalBrowse
        http://purl.oclc.org/dsdl/schematron0%VirustotalBrowse
        http://relaxng.org/ns/structure/1.0definenameincludegrammarxmlRelaxNGParse:0%VirustotalBrowse
        http://www.ascc.net/xml/schematron0%VirustotalBrowse
        http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd0%VirustotalBrowse
        http://www.remobjects.com/psU0%VirustotalBrowse
        http://tukaani.org/0%VirustotalBrowse
        http://tukaani.org/xz/0%VirustotalBrowse
        http://mingw-w64.sourceforge.net/X0%VirustotalBrowse
        http://relaxng.org/ns/structure/1.00%VirustotalBrowse
        http://fsf.org/0%VirustotalBrowse
        http://www.freedesktop.org/standards/desktop-bookmarksapplicationgroupapplicationsgroupsprivateiconh0%VirustotalBrowse
        http://purl.oclc.org/dsdl/schematronpathhttp://www.ascc.net/xml/schematron:node0%VirustotalBrowse
        http://185.208.10%VirustotalBrowse
        http://freedesktop.org0%VirustotalBrowse
        http://www.gnu.org/licenses/0%VirustotalBrowse
        http://www.freedesktop.org/standards/shared-mime-info0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        ebirbqi.ua
        185.208.158.248
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://ebirbqi.ua/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9dtrue
            unknown
            ebirbqi.uatrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.innosetup.com/Xzm9fAfKhB.tmp, Xzm9fAfKhB.tmp, 00000001.00000000.2132874520.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-14BEA.tmp.1.dr, Xzm9fAfKhB.tmp.0.drfalse
              • URL Reputation: safe
              unknown
              http://freedesktop.orgtypenameexeccounttimestampparse_data-is-RPNLQ.tmp.1.drfalse
                unknown
                http://WWW-Authenticate:Proxy-Authenticate:Content-Encoding:gzip1.2.8Content-Length:-/recvis-EHS2H.tmp.1.drfalse
                  unknown
                  http://www.freedesktop.org/standards/desktop-bookmarksis-RPNLQ.tmp.1.drfalseunknown
                  http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtdis-EHS2H.tmp.1.drfalseunknown
                  http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTDis-EHS2H.tmp.1.drfalseunknown
                  http://purl.oclc.org/dsdl/schematronis-EHS2H.tmp.1.drfalseunknown
                  http://gcc.gnu.org/bugs.html):is-CP383.tmp.1.drfalseunknown
                  http://relaxng.org/ns/structure/1.0definenameincludegrammarxmlRelaxNGParse:is-EHS2H.tmp.1.drfalseunknown
                  http://www.ascc.net/xml/schematronis-EHS2H.tmp.1.drfalseunknown
                  http://www.freedesktop.org/standards/dbus/1.0/introspect.dtdis-4QN63.tmp.1.drfalseunknown
                  http://tukaani.org/is-57AK2.tmp.1.drfalseunknown
                  http://www.remobjects.com/psUXzm9fAfKhB.exe, 00000000.00000003.2132448635.0000000002164000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2132303512.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000000.2132874520.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-14BEA.tmp.1.dr, Xzm9fAfKhB.tmp.0.drfalseunknown
                  http://tukaani.org/xz/is-57AK2.tmp.1.drfalseunknown
                  http://mingw-w64.sourceforge.net/Xis-0CKRF.tmp.1.drfalseunknown
                  http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dzextervideocodec32_64.exe, 00000003.00000002.3387998518.0000000003662000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://www.freedesktop.org/standards/shared-mime-infois-RPNLQ.tmp.1.drfalseunknown
                    http://www.freedesktop.org/standards/desktop-bookmarksapplicationgroupapplicationsgroupsprivateiconhis-RPNLQ.tmp.1.drfalseunknown
                    http://relaxng.org/ns/structure/1.0is-EHS2H.tmp.1.drfalseunknown
                    http://www.remobjects.com/psXzm9fAfKhB.exe, 00000000.00000003.2132448635.0000000002164000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2132303512.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, Xzm9fAfKhB.tmp, 00000001.00000000.2132874520.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-14BEA.tmp.1.dr, Xzm9fAfKhB.tmp.0.drfalse
                    • URL Reputation: safe
                    unknown
                    http://fsf.org/Xzm9fAfKhB.exe, 00000000.00000002.3383889372.0000000002158000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2131920082.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2134098240.0000000002140000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3383689424.000000000063D000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2137278806.0000000000648000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3384737739.0000000002135000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2133698100.0000000003100000.00000004.00001000.00020000.00000000.sdmpfalseunknown
                    http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ezextervideocodec32_64.exe, 00000003.00000002.3387901954.00000000035BA000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://freedesktop.orgis-RPNLQ.tmp.1.drfalseunknown
                      http://purl.oclc.org/dsdl/schematronpathhttp://www.ascc.net/xml/schematron:nodeis-EHS2H.tmp.1.drfalseunknown
                      http://185.208.1zextervideocodec32_64.exe, 00000003.00000002.3387608515.000000000352D000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      http://www.gnu.org/licenses/Xzm9fAfKhB.exe, 00000000.00000002.3383889372.0000000002158000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.exe, 00000000.00000003.2131920082.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2134098240.0000000002140000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3383689424.000000000063D000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2137278806.0000000000648000.00000004.00000020.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000002.3384737739.0000000002135000.00000004.00001000.00020000.00000000.sdmp, Xzm9fAfKhB.tmp, 00000001.00000003.2133698100.0000000003100000.00000004.00001000.00020000.00000000.sdmp, is-CFKF2.tmp.1.dr, is-EV29A.tmp.1.dr, is-29IF1.tmp.1.drfalseunknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.208.158.248
                      ebirbqi.uaSwitzerland
                      34888SIMPLECARRER2ITtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1524740
                      Start date and time:2024-10-03 08:38:12 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 30s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Xzm9fAfKhB.exe
                      renamed because original name is a hash value
                      Original Sample Name:d9cd9f798cb8012ce2834ac5e21ed371.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@5/154@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 90%
                      • Number of executed functions: 169
                      • Number of non-executed functions: 256
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      02:39:42API Interceptor393286x Sleep call for process: zextervideocodec32_64.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.208.158.248noode.exeGet hashmaliciousSocks5SystemzBrowse
                        noode.exeGet hashmaliciousSocks5SystemzBrowse
                          file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                            file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
                              SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeGet hashmaliciousSocks5SystemzBrowse
                                SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                                  file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                      boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          SIMPLECARRER2ITnoode.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 185.208.158.248
                                          http://Asm.alcateia.orgGet hashmaliciousHTMLPhisherBrowse
                                          • 185.208.158.9
                                          noode.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 185.208.158.248
                                          file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                                          • 185.208.158.248
                                          file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
                                          • 185.208.158.248
                                          SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 185.208.158.248
                                          SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 185.196.8.214
                                          SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 185.196.8.214
                                          SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                                          • 185.208.158.248
                                          http://www.jp-area.com/beppu/rank.cgi?mode=link&id=218&url=https://0oenqK.startprogrammingnowbook.comGet hashmaliciousHTMLPhisherBrowse
                                          • 185.208.158.9
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmpnoode.exeGet hashmaliciousSocks5SystemzBrowse
                                            C:\Users\user\AppData\Local\Temp\is-8ASKQ.tmp\_isetup\_RegDLL.tmpnoode.exeGet hashmaliciousSocks5SystemzBrowse
                                              file.exeGet hashmaliciousUnknownBrowse
                                                noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                  file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                                                    AX3-GUI-45.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousHTMLPhisherBrowse
                                                        AX3-GUI-45.exeGet hashmaliciousUnknownBrowse
                                                          qgdf1HLJno.exeGet hashmaliciousSocks5SystemzBrowse
                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                Process:C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2586624
                                                                Entropy (8bit):7.0380268176847265
                                                                Encrypted:false
                                                                SSDEEP:49152:rW4JtS+gCIx4ICoueGCMZuQfgQxQ/jgYsoPZnvhuN4Q28g:JIx4I9XGCMEQIqJ3WnYN4Q28g
                                                                MD5:96504F6C70AD91FDC3D32BF7C3FA2696
                                                                SHA1:5253C2279D7AD28D355DF486FA54698AFF453FEF
                                                                SHA-256:307B073C7B8C4FBDE223BD99B0A76D99ED8743DA27208CA59A437F9FE9F4C904
                                                                SHA-512:E2D1BAF4E09DD36842DAFF59D0ACD4B4D94594309D01DA653095557850C47FE75E7844078C146D7489A1A3B8966A1E39C41A943285BC4E7CC9134D2A03E15C4A
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....u.L..................".........(."......."...@...........................'......#(......................................."......p#..`............................................................................"..............................text.....".......".................`....rdata........".......".............@..@.data...8d....#..0....".............@....rsrc....b...p#..b....#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                File Type:ISO-8859 text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):2.0
                                                                Encrypted:false
                                                                SSDEEP:3:PDtl:r
                                                                MD5:80CC7E2E410B63D8EA5C5A746028D5E0
                                                                SHA1:FFFF6F79D563E0C02950FFDF975C93FA2A1CE68D
                                                                SHA-256:7A1FFFA01C0AEE4DB433C5F3AF51830ED8C90C61142506405CFD86436C43ECB7
                                                                SHA-512:194F0FCDC3E09F7973D0A1F499ACBE4C7A22F079D70777CF7CF8AEBD89D505EE2FFB0DBAC872E5448F58D3522D9C5BAF83CED5F310E65F0F5D80456536168FC1
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:H<.f....
                                                                Process:C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):4
                                                                Entropy (8bit):0.8112781244591328
                                                                Encrypted:false
                                                                SSDEEP:3:s:s
                                                                MD5:332CE785E973574A1C5FDAF3EEE3F083
                                                                SHA1:229F404A02E78C1CA4D476853B2621D128ACABCC
                                                                SHA-256:A2D398922901344D08180DC41D3E9D73D8C148C7F6E092835BBB28E02DBCF184
                                                                SHA-512:A93498D992E81915075144CB304D2BDF040B336283F888252244882D8366DD3A6E2D9749077114DDA1A9AA1A7B69D33F7A781F003CCD12E599A6341014F29AAF
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:a...
                                                                Process:C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):2.9545817380615236
                                                                Encrypted:false
                                                                SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                Process:C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):1.7095628900165245
                                                                Encrypted:false
                                                                SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                Process:C:\Users\user\Desktop\Xzm9fAfKhB.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):709120
                                                                Entropy (8bit):6.498750714093575
                                                                Encrypted:false
                                                                SSDEEP:12288:thu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyF:Pu7eEYCP8trP837szHUA60SLtcV3E9kT
                                                                MD5:16C9D19AB32C18671706CEFEE19B6949
                                                                SHA1:FCA23338CB77068E1937DF4E59D9C963C5548CF8
                                                                SHA-256:C1769524411682D5A204C8A40F983123C67EFEADB721160E42D7BBFE4531EB70
                                                                SHA-512:32B4B0B2FB56A299046EC26FB41569491E8B0CD2F8BEC9D57EC0D1AD1A7860EEC72044DAB2D5044CB452ED46E9F21513EAB2171BAFA9087AF6D2DE296455C64B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Joe Sandbox View:
                                                                • Filename: noode.exe, Detection: malicious, Browse
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):4096
                                                                Entropy (8bit):4.026670007889822
                                                                Encrypted:false
                                                                SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: noode.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: noode.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: AX3-GUI-45.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: AX3-GUI-45.exe, Detection: malicious, Browse
                                                                • Filename: qgdf1HLJno.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2560
                                                                Entropy (8bit):2.8818118453929262
                                                                Encrypted:false
                                                                SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                MD5:A69559718AB506675E907FE49DEB71E9
                                                                SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):13312
                                                                Entropy (8bit):5.745960477552938
                                                                Encrypted:false
                                                                SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                                MD5:A813D18268AFFD4763DDE940246DC7E5
                                                                SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                                SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                                SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):6144
                                                                Entropy (8bit):4.215994423157539
                                                                Encrypted:false
                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):23312
                                                                Entropy (8bit):4.596242908851566
                                                                Encrypted:false
                                                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):65181
                                                                Entropy (8bit):6.085572761520829
                                                                Encrypted:false
                                                                SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):268404
                                                                Entropy (8bit):6.265024248848175
                                                                Encrypted:false
                                                                SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):448557
                                                                Entropy (8bit):6.353356595345232
                                                                Encrypted:false
                                                                SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                MD5:908111F583B7019D2ED3492435E5092D
                                                                SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1606715
                                                                Entropy (8bit):6.432733703292802
                                                                Encrypted:false
                                                                SSDEEP:24576:qi0l5PSkLHq6M30RmWXD4cE/TpXy4CEJQwAj7/RyYijPIDEFIgX3zdHyqFMa:eSqVMkRm3dyEYiGEFTdfFN
                                                                MD5:34007E6F8E18D371DBFF19A279B008C3
                                                                SHA1:58B091382EB981587CA6FDFAFC314E458598B8BB
                                                                SHA-256:44D65416BB7EC0F43CE91927B33002CDF3E56038562F83E602C19A20C48AEB7D
                                                                SHA-512:37F6338CDEA6220CF9079F25F760A2C7A50A01BD6A98C01798D20203F5A56FA0F37CDD7E91AE246C1077A34EC4FA42E9D2305ADA7CA8945E6591C8E26164C906
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#.............*................xm......................................... .........................9........z......`.......................<....................................................................................text...D...........................`.P`.data...............................@.`..rdata..4...........................@.`@/4......D...........................@.0@.bss.....)............................`..edata..9........ ...|..............@.0@.idata...z.......|..................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...`...........................@.0..reloc..<............ ..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):171848
                                                                Entropy (8bit):6.579154579239999
                                                                Encrypted:false
                                                                SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1374336
                                                                Entropy (8bit):6.544219940913283
                                                                Encrypted:false
                                                                SSDEEP:24576:XxPyiEuJLPKpBW3n41iniSpKMFH/ZNYTujQb/XseSGwUCowrnDKHYHdT8s5ly8:B5XlHdxV
                                                                MD5:86CE128833ECB1AC52EBED17993C1B56
                                                                SHA1:C7FC8F88E908591CAAA9F25B954B06E814576158
                                                                SHA-256:B22B57B0B6E0FD531CEA32CED338B9D12DD018D09D0B95CD61F166F64253B355
                                                                SHA-512:1B8BEE2668599E33EA6F8121F7584431211512D6BCC8B409EAE162FBD6B505B0F4D0CD984AC8439C515BE4058A20270954D5DCBC62D16E95ED31A8225500F839
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........L......#.....0...................@.....k.................................W........ .........................I....P...................................}...................................................i...............................text..../.......0..................`.P`.data...<....@.......4..............@.@..rdata..,....P.......6..............@.`@/4.......@...@...B...&..............@.0@.bss..................................`..edata..I............h..............@.0@.idata.......P......................@.0..CRT....,....p.......&..............@.0..tls.... ............(..............@.0..reloc...}.......~...*..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):291245
                                                                Entropy (8bit):6.234245376773595
                                                                Encrypted:false
                                                                SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):509934
                                                                Entropy (8bit):6.031080686301204
                                                                Encrypted:false
                                                                SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                MD5:02E6C6AB886700E6F184EEE43157C066
                                                                SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):26562
                                                                Entropy (8bit):5.606958768500933
                                                                Encrypted:false
                                                                SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):235032
                                                                Entropy (8bit):6.398850087061798
                                                                Encrypted:false
                                                                SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):98626
                                                                Entropy (8bit):6.478068795827396
                                                                Encrypted:false
                                                                SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                MD5:70CA53E8B46464CCF956D157501D367A
                                                                SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):337171
                                                                Entropy (8bit):6.46334441651647
                                                                Encrypted:false
                                                                SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):174543
                                                                Entropy (8bit):6.3532700320638025
                                                                Encrypted:false
                                                                SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):140752
                                                                Entropy (8bit):6.52778891175594
                                                                Encrypted:false
                                                                SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1545467
                                                                Entropy (8bit):6.529166035051036
                                                                Encrypted:false
                                                                SSDEEP:24576:f//9GOTyiDI4jm0B4/W1EkWLENaQemY0y6hW98cA4q0v4gf:bVYKW983e
                                                                MD5:7F95672216191C57573D049090125ECE
                                                                SHA1:2C9D065A1F28F511149C3DBA219B52004FC51262
                                                                SHA-256:689991853CD09032089F52656C9508061F105FAB5727F250890563EBF2656A45
                                                                SHA-512:FD0DD095D5D76400FA97F5B3231D16570284EC31D04E2E9F3278F378233F316D4D91715898BF8A1B81803E613B97B2FE5FB064A9BD6BAE6E08AD3CAB9613E61B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........~.........#.....4...z...............P.....o.......................................... ..........................p...0...............................p...t...........................`.......................2..D............................text....2.......4..................`.P`.data........P... ...8..............@.`..rdata..@....p.......X..............@.`@/4.......M...P...N...2..............@.0@.bss..................................`..edata...p.......r..................@.0@.idata.......0......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..reloc...t...p...v..................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1400653
                                                                Entropy (8bit):6.518664771362139
                                                                Encrypted:false
                                                                SSDEEP:24576:YiyJaaUAnPfI1FO1Fm5wukMdBdfrwQAZV2R6yeYH3bhlN77S+N+RoQ8J0fnuVj1z:4aaUAnI1FOFmZkM1i2n5h++N+RCJ0fA1
                                                                MD5:1124DD59526216DF405C4514949CCB54
                                                                SHA1:8226C42D98B9D3C0E83A11167963D5B38B6DDD45
                                                                SHA-256:A9016D40755966C547464430D3509CC3CFE9DD5D8B53F8B694B42B0D7141E5D6
                                                                SHA-512:F007FBD3FBA7E3966FAF5F9D857ADB6607A99CD6FD8FFDF14E858BE6C4A0B155A9197BAA9D1DF0A28AF733F78F8A7346357EBAA7D3BD0C3934BF815CC51A930D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........F.........#.........B... .................q.................................y........ ...................... .......................................0..t............................ ......................8................................text...............................`.P`.data...............................@.`..rdata..Tn... ...p..................@.`@/4.......c.......d...x..............@.0@.bss..................................`..edata....... ......................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..reloc..t....0......................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):814068
                                                                Entropy (8bit):6.5113626552096
                                                                Encrypted:false
                                                                SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):397808
                                                                Entropy (8bit):6.396146399966879
                                                                Encrypted:false
                                                                SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):64724
                                                                Entropy (8bit):5.910307743399971
                                                                Encrypted:false
                                                                SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):181527
                                                                Entropy (8bit):6.362061002967905
                                                                Encrypted:false
                                                                SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1055417
                                                                Entropy (8bit):7.312780382733874
                                                                Encrypted:false
                                                                SSDEEP:24576:1MWKOBAUZLYRwPKDOlbbT0pGavkg3NyeuQ6l9fHOfc4Z:1dBAUZLYWiDOSpGaXBuQQ9u3Z
                                                                MD5:F721A6B0A1590D55EADEAE81B8F629AA
                                                                SHA1:8C6ED37D1D926D949161FF5F3B5682A4068644CE
                                                                SHA-256:8E2EB9BAC3F5C37D91BFF7F04420DDA55CD369178C73ADF11E6C4DD7E597260F
                                                                SHA-512:2FFDB23615EE72DF600248D6B9DED0E25DAE12D8424557EC07589F34601C00421CF32A748CB564AFCED99B419805E43BF4D6D05EC33D581DBD03F9AF853005E8
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........F......#.............................. f.......................................... ...................... ..u....0..<....`.......................p...............................P......................T1...............................text...D...........................`.P`.data...T...........................@.0..rdata..............................@.`@/4......TI.......J..................@.0@.bss..................................`..edata..u.... ......................@.0@.idata..<....0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..rsrc........`......................@.0..reloc.......p......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):92019
                                                                Entropy (8bit):5.974787373427489
                                                                Encrypted:false
                                                                SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):463112
                                                                Entropy (8bit):6.363613724826455
                                                                Encrypted:false
                                                                SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):165739
                                                                Entropy (8bit):6.062324507479428
                                                                Encrypted:false
                                                                SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):2586624
                                                                Entropy (8bit):7.038026594065054
                                                                Encrypted:false
                                                                SSDEEP:49152:uW4JtS+gCIx4ICoueGCMZuQfgQxQ/jgYsoPZnvhuN4Q28g:qIx4I9XGCMEQIqJ3WnYN4Q28g
                                                                MD5:9AC8705D486EC4A8049ADFEFFCF04C33
                                                                SHA1:AECFC52BB5CFE135A10AE8E5B3EDA096BF2ED2D2
                                                                SHA-256:EA2F8A32E61BF48DD43BA926C69C3680AA7624AAAD4D95190541AF2CB78F392B
                                                                SHA-512:1782856848F1F34878E9B54C394D982AE5E103126633F7A722408082794A7223F5EBBBFCCD8864546E19F9C7AB2BB6AC32F2E65DCCEF49DF79D44D344EA3E71C
                                                                Malicious:false
                                                                Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....u.L..................".........(."......."...@...........................'......#(......................................."......p#..`............................................................................"..............................text.....".......".................`....rdata........".......".............@..@.data...8d....#..0....".............@....rsrc....b...p#..b....#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):30994
                                                                Entropy (8bit):5.666281517516177
                                                                Encrypted:false
                                                                SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):693931
                                                                Entropy (8bit):6.506667977069754
                                                                Encrypted:false
                                                                SSDEEP:12288:pgl0XdgCyZfZ1hTDy4ArwyP5Lt6fEWmOxU:u0NnYZ1hTDy44PTZOG
                                                                MD5:37CE2C67DDCEE507833B9AE784AE515D
                                                                SHA1:711B2AAE989D439CC816D198A3A4A7CDD6A070A3
                                                                SHA-256:7A2BD595F34A25C13E94E4C2CDFB1758E9DE60FA7D497F5755BBBF906E82A0D7
                                                                SHA-512:B8FB5A3D2CA99A661FB35F1C560A283070D28A1E438BF124632D4AD8D2EBE0869DF73F1AB8149DEA1FCA66B0285D28028DF83EF36AB27431ED26176EC2A21FCE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....Z...|...............p.....b.......................................... ......................p../.......(...............................t....................................................................................text....Y.......Z..................`.P`.data...L....p.......^..............@.0..rdata..x............`..............@.`@/4...........0...0..................@.0@.bss.........`........................`..edata../....p.......2..............@.0@.idata..(............J..............@.0..CRT....,............\..............@.0..tls.... ............^..............@.0..reloc..t........ ...`..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):441975
                                                                Entropy (8bit):6.372283713065844
                                                                Encrypted:false
                                                                SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):259014
                                                                Entropy (8bit):6.075222655669795
                                                                Encrypted:false
                                                                SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                MD5:B4FDE05A19346072C713BE2926AF8961
                                                                SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):248694
                                                                Entropy (8bit):6.346971642353424
                                                                Encrypted:false
                                                                SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1222671
                                                                Entropy (8bit):6.4094687832944235
                                                                Encrypted:false
                                                                SSDEEP:24576:s2AYizbUVBV0u6ydQXUPIUJL0VGQRhORRajBbGN2JtYI3+0EIZy3fh6UtvR6YO3c:1AYhVBBsUJLORhH0QtYI33EuS1tvzO3c
                                                                MD5:C12734BD4C4C33E788FE7FC6C1E47522
                                                                SHA1:F474AB91C5DECD6D533C1DA016DC65800DBC5E9D
                                                                SHA-256:9FFCD35CAEC4B199481620C82B8E2AFA9AE26F557D9A99C18B7DC23E61D59131
                                                                SHA-512:AE948D3AB723144D2546F8B3401805CCFFBB312A14AD8D314685FB1EA85E74955F1372FEFE177571F518F51E66783B9813F876B93B35ED6E27C0E4743D59FA80
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........z..(......#.........v....................|h.................................*........ ......................`.......0.......p...........................k...........................`......................d5..`............................text...X...........................`.P`.data...|...........................@.`..rdata...N.......P..................@.`@/4......l....0......................@.0@.bss.... ....@........................`..edata.......`......................@.0@.idata.......0... ..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc........p......................@.0..reloc...k.......l..................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):706136
                                                                Entropy (8bit):6.517672165992715
                                                                Encrypted:false
                                                                SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):121524
                                                                Entropy (8bit):6.347995296737745
                                                                Encrypted:false
                                                                SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                MD5:6CE25FB0302F133CC244889C360A6541
                                                                SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):248781
                                                                Entropy (8bit):6.474165596279956
                                                                Encrypted:false
                                                                SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):101544
                                                                Entropy (8bit):6.237382830377451
                                                                Encrypted:false
                                                                SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):693931
                                                                Entropy (8bit):6.506667977069754
                                                                Encrypted:false
                                                                SSDEEP:12288:pgl0XdgCyZfZ1hTDy4ArwyP5Lt6fEWmOxU:u0NnYZ1hTDy44PTZOG
                                                                MD5:37CE2C67DDCEE507833B9AE784AE515D
                                                                SHA1:711B2AAE989D439CC816D198A3A4A7CDD6A070A3
                                                                SHA-256:7A2BD595F34A25C13E94E4C2CDFB1758E9DE60FA7D497F5755BBBF906E82A0D7
                                                                SHA-512:B8FB5A3D2CA99A661FB35F1C560A283070D28A1E438BF124632D4AD8D2EBE0869DF73F1AB8149DEA1FCA66B0285D28028DF83EF36AB27431ED26176EC2A21FCE
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....Z...|...............p.....b.......................................... ......................p../.......(...............................t....................................................................................text....Y.......Z..................`.P`.data...L....p.......^..............@.0..rdata..x............`..............@.`@/4...........0...0..................@.0@.bss.........`........................`..edata../....p.......2..............@.0@.idata..(............J..............@.0..CRT....,............\..............@.0..tls.... ............^..............@.0..reloc..t........ ...`..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):121524
                                                                Entropy (8bit):6.347995296737745
                                                                Encrypted:false
                                                                SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                                MD5:6CE25FB0302F133CC244889C360A6541
                                                                SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                                SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                                SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):814068
                                                                Entropy (8bit):6.5113626552096
                                                                Encrypted:false
                                                                SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                                MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                                SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                                SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                                SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):181527
                                                                Entropy (8bit):6.362061002967905
                                                                Encrypted:false
                                                                SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                                MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                                SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                                SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                                SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):268404
                                                                Entropy (8bit):6.265024248848175
                                                                Encrypted:false
                                                                SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                                MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                                SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                                SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                                SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1606715
                                                                Entropy (8bit):6.432733703292802
                                                                Encrypted:false
                                                                SSDEEP:24576:qi0l5PSkLHq6M30RmWXD4cE/TpXy4CEJQwAj7/RyYijPIDEFIgX3zdHyqFMa:eSqVMkRm3dyEYiGEFTdfFN
                                                                MD5:34007E6F8E18D371DBFF19A279B008C3
                                                                SHA1:58B091382EB981587CA6FDFAFC314E458598B8BB
                                                                SHA-256:44D65416BB7EC0F43CE91927B33002CDF3E56038562F83E602C19A20C48AEB7D
                                                                SHA-512:37F6338CDEA6220CF9079F25F760A2C7A50A01BD6A98C01798D20203F5A56FA0F37CDD7E91AE246C1077A34EC4FA42E9D2305ADA7CA8945E6591C8E26164C906
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#.............*................xm......................................... .........................9........z......`.......................<....................................................................................text...D...........................`.P`.data...............................@.`..rdata..4...........................@.`@/4......D...........................@.0@.bss.....)............................`..edata..9........ ...|..............@.0@.idata...z.......|..................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...`...........................@.0..reloc..<............ ..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1374336
                                                                Entropy (8bit):6.544219940913283
                                                                Encrypted:false
                                                                SSDEEP:24576:XxPyiEuJLPKpBW3n41iniSpKMFH/ZNYTujQb/XseSGwUCowrnDKHYHdT8s5ly8:B5XlHdxV
                                                                MD5:86CE128833ECB1AC52EBED17993C1B56
                                                                SHA1:C7FC8F88E908591CAAA9F25B954B06E814576158
                                                                SHA-256:B22B57B0B6E0FD531CEA32CED338B9D12DD018D09D0B95CD61F166F64253B355
                                                                SHA-512:1B8BEE2668599E33EA6F8121F7584431211512D6BCC8B409EAE162FBD6B505B0F4D0CD984AC8439C515BE4058A20270954D5DCBC62D16E95ED31A8225500F839
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........L......#.....0...................@.....k.................................W........ .........................I....P...................................}...................................................i...............................text..../.......0..................`.P`.data...<....@.......4..............@.@..rdata..,....P.......6..............@.`@/4.......@...@...B...&..............@.0@.bss..................................`..edata..I............h..............@.0@.idata.......P......................@.0..CRT....,....p.......&..............@.0..tls.... ............(..............@.0..reloc...}.......~...*..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1222671
                                                                Entropy (8bit):6.4094687832944235
                                                                Encrypted:false
                                                                SSDEEP:24576:s2AYizbUVBV0u6ydQXUPIUJL0VGQRhORRajBbGN2JtYI3+0EIZy3fh6UtvR6YO3c:1AYhVBBsUJLORhH0QtYI33EuS1tvzO3c
                                                                MD5:C12734BD4C4C33E788FE7FC6C1E47522
                                                                SHA1:F474AB91C5DECD6D533C1DA016DC65800DBC5E9D
                                                                SHA-256:9FFCD35CAEC4B199481620C82B8E2AFA9AE26F557D9A99C18B7DC23E61D59131
                                                                SHA-512:AE948D3AB723144D2546F8B3401805CCFFBB312A14AD8D314685FB1EA85E74955F1372FEFE177571F518F51E66783B9813F876B93B35ED6E27C0E4743D59FA80
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........z..(......#.........v....................|h.................................*........ ......................`.......0.......p...........................k...........................`......................d5..`............................text...X...........................`.P`.data...|...........................@.`..rdata...N.......P..................@.`@/4......l....0......................@.0@.bss.... ....@........................`..edata.......`......................@.0@.idata.......0... ..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc........p......................@.0..reloc...k.......l..................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):463112
                                                                Entropy (8bit):6.363613724826455
                                                                Encrypted:false
                                                                SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                                MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                                SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                                SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                                SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):26562
                                                                Entropy (8bit):5.606958768500933
                                                                Encrypted:false
                                                                SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                                MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                                SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                                SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                                SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):337171
                                                                Entropy (8bit):6.46334441651647
                                                                Encrypted:false
                                                                SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                                MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                                SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                                SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                                SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):174543
                                                                Entropy (8bit):6.3532700320638025
                                                                Encrypted:false
                                                                SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                                MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                                SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                                SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                                SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):235032
                                                                Entropy (8bit):6.398850087061798
                                                                Encrypted:false
                                                                SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                                MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                                SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                                SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                                SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):441975
                                                                Entropy (8bit):6.372283713065844
                                                                Encrypted:false
                                                                SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                                MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                                SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                                SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                                SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1055417
                                                                Entropy (8bit):7.312780382733874
                                                                Encrypted:false
                                                                SSDEEP:24576:1MWKOBAUZLYRwPKDOlbbT0pGavkg3NyeuQ6l9fHOfc4Z:1dBAUZLYWiDOSpGaXBuQQ9u3Z
                                                                MD5:F721A6B0A1590D55EADEAE81B8F629AA
                                                                SHA1:8C6ED37D1D926D949161FF5F3B5682A4068644CE
                                                                SHA-256:8E2EB9BAC3F5C37D91BFF7F04420DDA55CD369178C73ADF11E6C4DD7E597260F
                                                                SHA-512:2FFDB23615EE72DF600248D6B9DED0E25DAE12D8424557EC07589F34601C00421CF32A748CB564AFCED99B419805E43BF4D6D05EC33D581DBD03F9AF853005E8
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........F......#.............................. f.......................................... ...................... ..u....0..<....`.......................p...............................P......................T1...............................text...D...........................`.P`.data...T...........................@.0..rdata..............................@.`@/4......TI.......J..................@.0@.bss..................................`..edata..u.... ......................@.0@.idata..<....0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..rsrc........`......................@.0..reloc.......p......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):140752
                                                                Entropy (8bit):6.52778891175594
                                                                Encrypted:false
                                                                SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                                MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                                SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                                SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                                SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):509934
                                                                Entropy (8bit):6.031080686301204
                                                                Encrypted:false
                                                                SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                                MD5:02E6C6AB886700E6F184EEE43157C066
                                                                SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                                SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                                SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):397808
                                                                Entropy (8bit):6.396146399966879
                                                                Encrypted:false
                                                                SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                                MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                                SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                                SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                                SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 2%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):171848
                                                                Entropy (8bit):6.579154579239999
                                                                Encrypted:false
                                                                SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                                MD5:236A679AB1B16E66625AFBA86A4669EB
                                                                SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                                SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                                SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):259014
                                                                Entropy (8bit):6.075222655669795
                                                                Encrypted:false
                                                                SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                                MD5:B4FDE05A19346072C713BE2926AF8961
                                                                SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                                SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                                SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):64724
                                                                Entropy (8bit):5.910307743399971
                                                                Encrypted:false
                                                                SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                                MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                                SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                                SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                                SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):92019
                                                                Entropy (8bit):5.974787373427489
                                                                Encrypted:false
                                                                SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                                MD5:CC7DAD980DD04E0387795741D809CBF7
                                                                SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                                SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                                SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):165739
                                                                Entropy (8bit):6.062324507479428
                                                                Encrypted:false
                                                                SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                                MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                                SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                                SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                                SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):101544
                                                                Entropy (8bit):6.237382830377451
                                                                Encrypted:false
                                                                SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                                MD5:E13FCD8FB16E483E4DE47A036687D904
                                                                SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                                SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                                SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):291245
                                                                Entropy (8bit):6.234245376773595
                                                                Encrypted:false
                                                                SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                                MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                                SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                                SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                                SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):706136
                                                                Entropy (8bit):6.517672165992715
                                                                Encrypted:false
                                                                SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                                MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                                SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                                SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                                SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):248781
                                                                Entropy (8bit):6.474165596279956
                                                                Encrypted:false
                                                                SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                                MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                                SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                                SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                                SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):248694
                                                                Entropy (8bit):6.346971642353424
                                                                Encrypted:false
                                                                SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                                MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                                SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                                SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                                SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):30994
                                                                Entropy (8bit):5.666281517516177
                                                                Encrypted:false
                                                                SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                                MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                                SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                                SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                                SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1545467
                                                                Entropy (8bit):6.529166035051036
                                                                Encrypted:false
                                                                SSDEEP:24576:f//9GOTyiDI4jm0B4/W1EkWLENaQemY0y6hW98cA4q0v4gf:bVYKW983e
                                                                MD5:7F95672216191C57573D049090125ECE
                                                                SHA1:2C9D065A1F28F511149C3DBA219B52004FC51262
                                                                SHA-256:689991853CD09032089F52656C9508061F105FAB5727F250890563EBF2656A45
                                                                SHA-512:FD0DD095D5D76400FA97F5B3231D16570284EC31D04E2E9F3278F378233F316D4D91715898BF8A1B81803E613B97B2FE5FB064A9BD6BAE6E08AD3CAB9613E61B
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........~.........#.....4...z...............P.....o.......................................... ..........................p...0...............................p...t...........................`.......................2..D............................text....2.......4..................`.P`.data........P... ...8..............@.`..rdata..@....p.......X..............@.`@/4.......M...P...N...2..............@.0@.bss..................................`..edata...p.......r..................@.0@.idata.......0......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..reloc...t...p...v..................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):448557
                                                                Entropy (8bit):6.353356595345232
                                                                Encrypted:false
                                                                SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                                MD5:908111F583B7019D2ED3492435E5092D
                                                                SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                                SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                                SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):65181
                                                                Entropy (8bit):6.085572761520829
                                                                Encrypted:false
                                                                SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                                MD5:98A49CC8AE2D608C6E377E95833C569B
                                                                SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                                SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                                SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1400653
                                                                Entropy (8bit):6.518664771362139
                                                                Encrypted:false
                                                                SSDEEP:24576:YiyJaaUAnPfI1FO1Fm5wukMdBdfrwQAZV2R6yeYH3bhlN77S+N+RoQ8J0fnuVj1z:4aaUAnI1FOFmZkM1i2n5h++N+RCJ0fA1
                                                                MD5:1124DD59526216DF405C4514949CCB54
                                                                SHA1:8226C42D98B9D3C0E83A11167963D5B38B6DDD45
                                                                SHA-256:A9016D40755966C547464430D3509CC3CFE9DD5D8B53F8B694B42B0D7141E5D6
                                                                SHA-512:F007FBD3FBA7E3966FAF5F9D857ADB6607A99CD6FD8FFDF14E858BE6C4A0B155A9197BAA9D1DF0A28AF733F78F8A7346357EBAA7D3BD0C3934BF815CC51A930D
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........F.........#.........B... .................q.................................y........ ...................... .......................................0..t............................ ......................8................................text...............................`.P`.data...............................@.`..rdata..Tn... ...p..................@.`@/4.......c.......d...x..............@.0@.bss..................................`..edata....... ......................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..reloc..t....0......................@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):15008
                                                                Entropy (8bit):5.270725103917416
                                                                Encrypted:false
                                                                SSDEEP:384:s/nUm8NYR/fiYM8LXMX5fs38Ffx4Bf0lAT9:s/nX00iY/XMXq38FxK0lq
                                                                MD5:64C98ACB587FC7E4F237EADAA84A591D
                                                                SHA1:B92C3D066E67FC230D56E690AE1CC21222265614
                                                                SHA-256:6E8E87C68E7EFC5CCF8694042649DE3EBA01EC1DF242C22D40842AF885D1118D
                                                                SHA-512:B1542C0E3D5411CD8581150FE2D81401C93686E7E43754E8BF8F78ACBEB73A041F7D9223D7DC8072C132273D1DB6EB9917ED04F9F2123C1CEA4062E59CD7F129
                                                                Malicious:false
                                                                Preview:#.# This file is part of RawTherapee..#.# Copyright (c) 2004-2011 Gabor Horvath <hgabor@rawtherapee.com>.#.# RawTherapee is free software: you can redistribute it and/or modify.# it under the terms of the GNU General Public License as published by.# the Free Software Foundation, either version 3 of the License, or.# (at your option) any later version..# .# RawTherapee is distributed in the hope that it will be useful,.# but WITHOUT ANY WARRANTY; without even the implied warranty of.# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the.# GNU General Public License for more details..#.# You should have received a copy of the GNU General Public License.# along with RawTherapee. If not, see <http://www.gnu.org/licenses/>..#..# Please keep this gtkrc in sync with the other ones from Clearlooks based themes...gtk-color-scheme = "rt_base_color:#ffffff\nrt_fg_color:#101010\nrt_tooltip_fg_color:#000000\nrt_selected_bg_color:#7C99AD\nrt_selected_fg_color:#ffffff\nrt_text_c
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):24
                                                                Entropy (8bit):4.136842188131013
                                                                Encrypted:false
                                                                SSDEEP:3:1ERdiAqRv:1+MJ
                                                                MD5:2BE834BAC02BFB69E1E7935A62A6B8FB
                                                                SHA1:6165F776AC298A991E497B03E9C2E1797ED81029
                                                                SHA-256:113DBDDEAEE29ED930AF404A0C0D5356A95D9D1B53BAE343F2782A29B5D4DBC9
                                                                SHA-512:1F3BC0176EC15394E6CAD295A077F33C66BD9FEA4598715B5EDED4DDE397DE519FFC6D171E9DB53A09A50929FE6D8EDE5D4D51B5B786A0C3BE6481CB7A5BA4FC
                                                                Malicious:false
                                                                Preview:[General].Iconset=Light.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):137
                                                                Entropy (8bit):5.815385299502723
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8ll1Aqg/ml90lvGdw1CwHTQ5NsEZxKG2mpFbp:6v/lhPW/WqgmnBdw1CFNsgdLbp
                                                                MD5:CE4C02BA4708A1AAB1572A9148A94B95
                                                                SHA1:E90673F72B063A610E7383EB7DAFEC7F0BD35549
                                                                SHA-256:6E1332235BB51B2E29B244E5056A6C82015A5FEE79DB2D3A553CD6610DC3BB04
                                                                SHA-512:902C214744235E7CA936D2B16215B63500BA980C00ADFD3773D2EFA65E12FD3EB34DA4F430024BEF2F781F762E4A938778C6AD71AF6D86A9CF02EF53C41E1233
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...PIDAT8.c`......._..........H1.....8....XIu.... ..b+..E.$..(.+. ...( .4.e@x4..G..6.g...t....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):194
                                                                Entropy (8bit):6.478660891705174
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8llsAX81qfqjovwzflWfXbbt8i7ltydfIxDGKuQ11iEUvWK2K1:6v/lhPW/sAXkDokflSoAkpOKtMyldp
                                                                MD5:88BC92E4CF3288BA93CAF398950874CD
                                                                SHA1:F1B9F2C5EF5566C5BD983B5E1B3DFF17B06412F2
                                                                SHA-256:258CD3545E4E4A9CF32F31FBD1AAF19869118F2B32CC8AB88C421D53F0A63D6D
                                                                SHA-512:07DCA4BFC9581F425D7BAAB13E91668A0F1C832518DE7E98C0F872A305401B68B1D1C6DB56A81CF55A81E6587DD57168AF49D5676FF24C07A0BF6B0E04FADF8B
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...!..a......I.h..y......U...,.@3:O..E!x/......Q.@..9........{..b..U.0...&HQ.5........P.W ..;......hc.3.....B.}........h..f...;l^.. *.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):206
                                                                Entropy (8bit):6.093633689706192
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/f19VNtTlMGBSCghX2AGBIcDV6fr66Vp:6v/7uTVPTChXCBN8fJ7
                                                                MD5:2DE4E41A0E31A4C0FBB2D7FC3CBC31CE
                                                                SHA1:0704F540352C579647D28E5E7821D7CA7FCC6613
                                                                SHA-256:FBEC4D0BC6ED3DFDADADFFD10EB9F04058DFC11E7248DD73814E7806E58795FA
                                                                SHA-512:FE60C53AADB80B6B922E17B822710A6820046C07D2742694BDF3019DD025EB8ABF4366849BE789E122B7053D5B7798D1CEAA9A296C3D007C557D95CDFFEC0115
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....bKGD..............pHYs...........~.....tIME...../..v[....[IDAT8.c...?.50.A.o.../...hx)T.h.x....Lp..yI..?..D2......F.@....P1..[.....C ..4...m4A.G..F...=.G....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):135
                                                                Entropy (8bit):5.763983120472731
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8llrAkxHgbcMktxY8ot4sUnG/QgjOD4l+dCKolkup:6v/lhPW/skd/Mktx+thzjOciCflkup
                                                                MD5:C1E1CF920D57580A1337044D9244B41A
                                                                SHA1:2713C8C06B08A204042B3BF92F6E31724E965E81
                                                                SHA-256:8BFC445B29843719FB37F265F727D4E9E6F6C0814F054A6330C096022CA7995A
                                                                SHA-512:87968296D3A160EEA1C3CE012300DF21CC59ED57ADE023B76E9238AE37F491B3F585663CBC4ED86A99EA1E3C4E392672E0CEA803A2641C9F05651E62240FF358
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...NIDAT8.c`...........(5D.....\......S.8....1D..#...QjP...A.....E^C3P....z.......g...7.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):195
                                                                Entropy (8bit):6.589496150082679
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/YkNWoInpCU14phhk1NWMUGHgyU/Hljp:6v/7uSoIpCUKhhDMUrymlN
                                                                MD5:3043F969482A1E805E6DCA44A6072881
                                                                SHA1:B5764E5B1B26D11737D9307A70E14403E7063A4A
                                                                SHA-256:10A3799ABAABF93F03FD86A23FAFC6C68EB04B5BFB86497F04505DF151E1177E
                                                                SHA-512:3BEAAFABEEF07E3BB7E95DC6C761157C38B9B2B2BDB99C517C073AA137950BFE010C0BDFCC29E955B6A46D6BEED4AB4D8D8D1EF580DD23E8A6B0F471E1FEB4D3
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...?..A...E....F'.j....DG.U$......N.|.....r..k.d.,..$4P.)R..}.F/.h..)...Q..c.%.x.t.8.jc....).......,p.3.i.k...v.F...X....^...Y.........q.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):208
                                                                Entropy (8bit):6.056729441397141
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/f19VINtlMv+YftbtCETdkth4EN0QIVp:6v/7uTVI6T6T4ENRI7
                                                                MD5:3DBA17AB50E1923EB74BF395677EFA06
                                                                SHA1:F293297F4127A788E07D365FD4AB5EB19C7383C4
                                                                SHA-256:33BF303743432947AF7E5E4FCFE7A7FF453FCFBFA6ABDC24671071B7C205DA84
                                                                SHA-512:618BFD415108DDB51B7A1D1003D5E40A417BA36F612EF6FBB5F627AE7FDA2388AC2F08F8BFBE5CF6F172DF26737773C902A85FD98DEFB0CD7DE94B3CFF77FAD6
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....bKGD..............pHYs...........~.....tIME.....,"E......]IDAT8.c...?.50.AT5....(1......../%. 9.._.!`19........,....5..a) ^..?)5....@|...F.<.F.h^..A..p..:.j=....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):5.703022629772099
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8lli9uOgkBCvMibqMGuNGpNfodyfsiB1p:6v/lhPW/i9uOliMibqMGjAMkijp
                                                                MD5:65B820457098F3E41079DB7B024D6911
                                                                SHA1:2D35F7523C5F990B810FAD7E2DFB1E2E46DC94AB
                                                                SHA-256:3CA8816EC6B9E88958D7D33C3532CE57223E5B3454D2AE329A54C964590034D6
                                                                SHA-512:52FAD1A53340EE03016E6B63364EE937BBA8C1FCBC8F491011D707102100F9BFCBB62C5D0B9D3F40BF8CEF48E4E9566271019CBA10CD57C4ACFA05EF210DF4E8
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...GIDAT8.c`......./...0.....X.R...8..S.....(5..#.X...EQjP.4.x(.l...........g.*Uug....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):193
                                                                Entropy (8bit):6.5470203907323725
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/bkgGNdjs2jOTS3Bs077TxUVxhlup:6v/7uzkgG7Y2yU14lc
                                                                MD5:8FB0652E37E5375EFBFFC85E000333EC
                                                                SHA1:98DF46702AB67C5CFF30922BE409209CEA30A6B5
                                                                SHA-256:90939B8E3B4A568724143D056A93CD7B5528D4841A9D11EA0A4B11C2A35A4E03
                                                                SHA-512:EF67A9624AA003A77724CB90F456A84181746E585003B31AE714A2870FFB3B2F069382CD7DA464FDE6BA68C37A94AE42CCB58B80E0608D41EEF30A81260D5545
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...1..Q...Aa....R......h..~,...:..)..S.7.f...r.I...Rd...a...X..g<p...tBE3\.....&.rU^.WW..!FTF{.5....8b.>.1.o.,.O..........i......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):139
                                                                Entropy (8bit):5.9354638900987355
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8ll3MOgkBQTBlH/DVgPMWwnPUmLdeAkhBsF6c4V1B/0wXjp:6v/lhPW/cOlcBZKkWoLdePhq2BcwTp
                                                                MD5:5EACCA1FC3A11F7E844B3809D9CAA537
                                                                SHA1:86AF79F715B3921E507068558EEDC94EAAC677C6
                                                                SHA-256:57A9751B8A85FD13C3F0C9EEAEB3B905D7B8802779EFE407E13444468A15C396
                                                                SHA-512:997D5D631FF90CAD01D1613A347BF2C1F9D0723AF29A5CA52494BBEF97F4FA50040B171FD371F8A8FD31DDA2933EF0752ABC3056625A9DB747BC5E24EB6F7CD2
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...RIDAT8.c`...........0h)._..` f....!...P9J....@.F.....;%....@,EI`..b.J....<..a.....z...l....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):137
                                                                Entropy (8bit):5.807754777184353
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8ll1AqgRtKq2HYGHgsG0z4H1iBLq/bp:6v/lhPW/WqoKq24Psjz4H1ipep
                                                                MD5:BDBB9972D9B7265AD10EDB04A9C2E239
                                                                SHA1:DCA1CBFD90B5C644E37DBB6748227E3EB472E0C8
                                                                SHA-256:866FC4117FC8B133D84C9AC96D13A37E99EBF626CEA47F0E8B059B6641FFC7C3
                                                                SHA-512:BA6059567C6EF35161BD3A82D320EFB8E16435EBFF9CA851AC724A58F45726621BCF7F380DBD2A94A29B5DD919FEF294E7440B31F2B2FACC42AAA1968144020D
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...PIDAT8.c`......._..)5...#.8..y(1.....\C..8.. .[.TCX.8........b...+@.Abr.Ip....2g..F.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):194
                                                                Entropy (8bit):6.427379953657502
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8llsAX81qfqjovwzflWfXb0oWhAm2KWmLk8vJvP+u3tKDhqcl1:6v/lhPW/sAXkDokflFoWhAmtW6k8ZUbp
                                                                MD5:830FC62D759022DDBC665F1D8D2E9164
                                                                SHA1:84FBC1F8F3770905AB365D465C956756FD62E15A
                                                                SHA-256:0D0ED367EC6578DD5DB6A3637A5CFBF6DDEEB1CE12953C1DF09FEF8F8BD897AA
                                                                SHA-512:B948DD792BC0379AFF1DB46A8ABFE5803005E3C5C1BC2F2ED382C4D5AF09DCCA7C8F98400B46B0C5CC1100CD492A8D1C3B90A5BE9B2C5EA2537DAA7911B3458C
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...!..a......I.h..y......U...,.@3:O..E!x/.~..h..f|.u.....4.]hc.3.....@.!v...!.+PC.k\=.A.....1...0A.*H.c..{.Qb..RTA..r.(P.@......;'...!\.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):220
                                                                Entropy (8bit):6.113077361175645
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/CsQH4dKcDA/M+DPu45sC93H5Adp:6v/7ugHcZuK45sC9X5C
                                                                MD5:0BAE3C12DFF85642E6DEBB90607258F0
                                                                SHA1:2B369328373C449DA154FEEC4235464F53AC27FB
                                                                SHA-256:8C41C0E27B9D85D5D49BF44F00A096FA18680E85077FFEB9EC65750F1EFAAA41
                                                                SHA-512:D86BAF78EECDFB96E857D1749BB0580F6230F83D54D4F4843F94EC6335AF339D22560A00907E897A9BB427200305B83056B4649321ABE0C719DDCA89549639D0
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....sBIT....|.d.....pHYs...........~.....tEXtSoftware.www.inkscape.org..<....YIDAT8.c...?.50.A.. w v.. ) .....X.\...x...X..#. . ..d./ .&. . >...\.b^R..ze1.^...M... .1.....d.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1128
                                                                Entropy (8bit):7.702657785044095
                                                                Encrypted:false
                                                                SSDEEP:24:CiUpjur3mHiYuZssTwiTn7JgcOc/irhx1F613aC8BLZ2cL/Fsc:CNpj23hnNTwiTPzU6t+JI4FN
                                                                MD5:3F6A543B6C75ACB2EE000A3BAC7B9A59
                                                                SHA1:A53275A9B4F65393301A1C787B67E87FFDA8234F
                                                                SHA-256:3FACB849498CFA7CCF96BF7B02C5792C0DC49374EA7DDDC8F78E7ED53A96C72B
                                                                SHA-512:E9E98AFF394E4ADAEA3C79096BD8DC865EF539D67F9E3030FEB7F4FACAACC1278606592228A19733AF99128966530CEC1363E9C6DAB6C555DFC0D8C7ADB51517
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<.....IDATX..=SSA...........G.+F....._daaaa..a.....JG+.... 7$ww=g.ws..A/n.~.>.y..+}......=%.Tn..m.....Bt.....N..'.....Z.'...........;....[.d.....~.....9.LI.?>W.........It.W..m...N...x&8>.....}....0....JoU,<X$G..m..YV......w..L...:n..FJ..!......."|.......C)........)p...)F....[.Y..{..jZ@.j.s5xv.W.|L&./.^.u..y....h..4.9b..}$..q.....".....{..p..9;.s..Ul.............^......p...d+.....u......tZ...B......d..Z.....q.....'H.}...g.jl....~a.ng...m.....mw.fp..0....,MI..v.W..7........l8.s.K..*.2....qB..|:.\[...Nje...!..L.^q.Z.hU..f..35s..hK.......R.. $.-..:.......7.p6N.i.+.....u..!RE8..L&...U+...s.x.O.s.H.U.R.E..>z.".......".DB.....9F.......h...W.<.....KH.DO.}.q.!.*....<8.c.J...A.|.S..}.d..ZL......vh....<.#.......W.i..+...m....p...8..Q......A....7..f.sk=.....!.%........tY...S.+...t.Y....1.97P!..a....a.%.m9[~I..K.?..tB.v.L&.[-.h...D...J'......Q'4...59.......I.s..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1497
                                                                Entropy (8bit):7.768741056434717
                                                                Encrypted:false
                                                                SSDEEP:24:oqyoicsCo1Rd3ASFaaFX4FumgLpc8ut4qzrtpei0AF3BkNmhqCTEOU:eznTR3YaFXSiut4qzrtbeNmhTE7
                                                                MD5:F860FF3693F12371577E33808AEA17E7
                                                                SHA1:10EA223E855685506460EA8C3FC9427350CAA1E2
                                                                SHA-256:B8714DCC43D031A602E3C560EBB1A07C1A892AB84E34F06EDEB03B59FEB09BD6
                                                                SHA-512:6A6307796F6C6D5FEC3A0B4168DCAD5E6B15008D5CC247B562ECE25E25B87AC40ECB372038E351674FC75AB391CA23E47B8DF1966D2849DC3DD0ADFFB7CEFA62
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sRGB.........bKGD.......C......pHYs.........B(.x....tIME......3...g...YIDATX.W.N#G.....`.......6........O&.b..@......`....J..)... ...0..Q9..n..1.LK.vwW.s...q. .x.........~.+..V...C..G.....4M.,.B.^.......w...1.}.33X....z....[,Jfgg........Z.R..'..y18@I.G....www...u...6ZYY.....w,KH.....nnn.....[\\lLLL.7..z.........$.,.3~||.......uOOO....{.........................1..XkC...}...D..M`.n..i...6dvNNN.9::........j..[.sssMX.I.........~B...`.(.....n...^]]].......hdd.k...o...rp~Lp.....%..*G.$.k4..\...6..:..._X...Yz.J0..`ll..).R..(...s... C.....J...0+x6m.A.J...X90L..~.i.H.(..?....`....|...}.......*d.>...v G.9....AR.W...H.$......H.i..?.)..<..)..Ps..<.x.....Lc........E}.,.30.5.p.........$.Et....\E...!.Fd...e......5.Q..s.I.B&.}..#.@..j.E..d..... `h=QL[..2..+..M.C.....k.s.i.I.3..+r.Z]..G|$..U..!..........{..J...T....K..e..1.e..[EY+.(T.T.<!.Y.I.....O.x.\L..^c..FHH.S........F4.f.{....S.....*eS. ..4....(...eQ.|9.....!.R4.X.+.<..!..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:GIMP XCF image data, version 0, 32 x 32, RGB Color
                                                                Category:dropped
                                                                Size (bytes):3977
                                                                Entropy (8bit):5.413488066014333
                                                                Encrypted:false
                                                                SSDEEP:48:7dsNCv/C/CVGhkFTKfyeeocjI4Dc8oPjZ/narUX0Zwnc1ZHHdOkdsFVpAa:KcQ2Gyejc0QoPjZ/KKgwniLsFVpAa
                                                                MD5:1339E8669A986ACB3CCA794EF7E67ABB
                                                                SHA1:8295D74B144481F86B928D0C9A2F16AE0FF86F7C
                                                                SHA-256:4D58C67A4095BE33201E16C2545B28DEF1CBA2D7690F0540877866CFC7ACE230
                                                                SHA-512:DF9AA421947EF90713D0F9D2648803DDC975DB7FDB67F2941A9CA7FD489C9734081FE085C4ED4335C798A05CE2028D84C22A4948C558FDCBE86593CFEBB6A796
                                                                Malicious:false
                                                                Preview:gimp xcf file.... ... .....................B...B..............?........................gimp-image-grid.........(style solid).(fgcolor (color-rgba 0.000000 0.000000 0.000000 1.000000)).(bgcolor (color-rgba 1.000000 1.000000 1.000000 1.000000)).(xspacing 10.000000).(yspacing 10.000000).(spacing-unit inches).(xoffset 0.000000).(yoffset 0.000000).(offset-unit inches).................................5........... ... ........New Layer............l...............................................................................................................+...........=....... ... .......Q....... ... ...a....E...............................#.E...............................#.E...............................#.E.............Vq.q.W......?......?......8......8..............#.... ... ........New Layer#4............................................................................................................................'................... ... ............... ... .........................."..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1442
                                                                Entropy (8bit):7.754161124979248
                                                                Encrypted:false
                                                                SSDEEP:24:oq2vym+9kVWUOASjz39hd/9uinkxIyJubx/98nDDJFPyvfCDFHTCyFm+3wTf8f4C:aqmzV9az39z9hnkx+2DfyyD9TFAAwTfI
                                                                MD5:46934D3CAA685BB0DBECF20BAB8BC317
                                                                SHA1:DD61BF668D265AB3FBB61C6CB6CF25778632154F
                                                                SHA-256:AC57AEA1D66661974EA2922733661B27D26D3C2026321E77A2A9ACE1CDAD558C
                                                                SHA-512:BCB6D969F8823196652B4093988719C9F51940890D212A0E743CC887C46BE3DAD00D95B47970F1E682F3A40E7F7216EBFD4B37626AE130FE57F7F3CEBA718AE4
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sRGB.........bKGD.......C......pHYs.........B(.x....tIME.......E......"IDATX.W.J,W....jm.A#>AA$......$....q.....!B.Cp..;1...p((...G=.Vyve...+...>g._....q.:..[__/.--}.....w..X.s.....y...N.EN..9.<koo.smmmknn...!V.b...OOO.8==....'........;;;}...}z..+.....vrr.8<<.........._....755.............r___G[[[+....%...z...\..T*..........Ay|||.........O...w......._utt..D{.T*.......1H..;.Z-......u......?........../....J.......m....F.=D+Rk.....PP.\..Ix....Z?;;.666...}.xW.{Z\...j....c...X1..zm.>..y.!...S.u.....o=l..n..._.f....R..P.."....~..8......l..`.;..B\........>.A...7..Q.F..4..=./.B.......eY..$.<..r....A..$.$.<.`)...........C...V...8.......^.....D&........r..Y9.K.....8..C.....%.UV;*....^. .d.....v. ......M...X..M..zR...H...'..'._dS..P.?..2S.MT......4$.....k...=.eL.^z.....X.e+.......$..sG..qm.vB.........&..I..+W....Q. ,.M.+.-Q..$<!.t....wi.rA..(v.kW..&.p.-.(..u+.j.5.y.....2N.....0....kW....5.y).J1. xDW...x..0.d.p.\S.d......l
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1555
                                                                Entropy (8bit):7.796645823149652
                                                                Encrypted:false
                                                                SSDEEP:24:oqhLS0rCCBSazjoXK2RM1EpIuNF0piVLDlZLfciK3ZCHBJW:VjrBBSFXKP1ECuNF0piVLDlBfcOM
                                                                MD5:486390A2CE5B4CC1393AC254780A7C7C
                                                                SHA1:4305181EC1910A666A47C3715D27F5CA6991D688
                                                                SHA-256:AB3BDFDFEED5743FD4AF47B0BA6AAAD914661DCE381A6FF8C8C8994363F83909
                                                                SHA-512:F3F6051BA679C6F329A18E97F12CB6FFD9ED18D0F054C79ED9F2FB5D23F0484A12DB0FD16CD47F52B67E3D617F9BE728F9BECC850CF6A61FE9B74ED9701C2DD1
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sRGB.........bKGD.......C......pHYs.........B(.x....tIME......._......IDATX.WIO#G...+;.Ab.@B$...&...Q.?B2Q...[...8!qEB......bK.....-!..n.....Twlfh.T.v....Wv...eY....Fjiii.R.|..T*.:..a.^.@.U..Z.......~yyy{vv....F.."..NOO....z...S...+....:;;. ...n</....^.xx(_^^.'''.;...mmm..eU...^....011....L.......-...y..Vx...}...A.X,...>..............G....|?99.077.=00.......L&..h._..e..*..U(X....w......w...?.;;;_.........`_www[___..@.Q.H.O..........$,..r.J.P.nnnV..{....{j.....B@..c....!....u....C"P4M.b...V`./<,|.....t...J6...^...H.3..-m.}..5..)..A.0.-Z...!.......V....".:....Y#..z$^H.......eZBa.[..cXd....P:f.P>.&...<....-..v.2..J..DV-.5..i.Z....F....u E.%9...(p....Bpu...Gp...P.]..j.....U..i.!b...*..I.NF(.5.."-.n..L.V.1I.L.D>-..2..Ih..}.J*.`;.......u..*..0..=CC+.P.B.i.@...+..............:1....N%.M<e.....XAUF.W.Sb.M.f.=G...*.be..j.'/...$#.H..0...^......=..u.1s7.B......L....RO.L.Y....T....].Lk..SS..I(..4.Lwf.3N...=...sF#..o9.MK."`...
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1497
                                                                Entropy (8bit):7.768741056434717
                                                                Encrypted:false
                                                                SSDEEP:24:oqyoicsCo1Rd3ASFaaFX4FumgLpc8ut4qzrtpei0AF3BkNmhqCTEOU:eznTR3YaFXSiut4qzrtbeNmhTE7
                                                                MD5:F860FF3693F12371577E33808AEA17E7
                                                                SHA1:10EA223E855685506460EA8C3FC9427350CAA1E2
                                                                SHA-256:B8714DCC43D031A602E3C560EBB1A07C1A892AB84E34F06EDEB03B59FEB09BD6
                                                                SHA-512:6A6307796F6C6D5FEC3A0B4168DCAD5E6B15008D5CC247B562ECE25E25B87AC40ECB372038E351674FC75AB391CA23E47B8DF1966D2849DC3DD0ADFFB7CEFA62
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sRGB.........bKGD.......C......pHYs.........B(.x....tIME......3...g...YIDATX.W.N#G.....`.......6........O&.b..@......`....J..)... ...0..Q9..n..1.LK.vwW.s...q. .x.........~.+..V...C..G.....4M.,.B.^.......w...1.}.33X....z....[,Jfgg........Z.R..'..y18@I.G....www...u...6ZYY.....w,KH.....nnn.....[\\lLLL.7..z.........$.,.3~||.......uOOO....{.........................1..XkC...}...D..M`.n..i...6dvNNN.9::........j..[.sssMX.I.........~B...`.(.....n...^]]].......hdd.k...o...rp~Lp.....%..*G.$.k4..\...6..:..._X...Yz.J0..`ll..).R..(...s... C.....J...0+x6m.A.J...X90L..~.i.H.(..?....`....|...}.......*d.>...v G.9....AR.W...H.$......H.i..?.)..<..)..Ps..<.x.....Lc........E}.,.30.5.p.........$.Et....\E...!.Fd...e......5.Q..s.I.B&.}..#.@..j.E..d..... `h=QL[..2..+..M.C.....k.s.i.I.3..+r.Z]..G|$..U..!..........{..J...T....K..e..1.e..[EY+.(T.T.<!.Y.I.....O.x.\L..^c..FHH.S........F4.f.{....S.....*eS. ..4....(...eQ.|9.....!.R4.X.+.<..!..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):641
                                                                Entropy (8bit):7.486329990930914
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2HcHsH4mHgE42VgbsrP2eByHKk8a4JLk++8/1:HS2H8mJJfIsrueEq9z+c1
                                                                MD5:752E6CDC2C92BF4D22712F33A380CB93
                                                                SHA1:07AC399AD6C9F72E97A1304E1324AD20EB42F633
                                                                SHA-256:3294FEF8285A13B09967D3F631F8CE52C2AACC9A07604CD51B70811BED2ED40E
                                                                SHA-512:9DC2C06873DE889B4E26AA9890B93E6FD37D04C73801865861FA46B95C2011BFEEC94B24F37BBD376C43E993FEE58D1C4A221AF09346CE70AF86BF379BD6CCA2
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....1*........IDAT(Se..k.A...|.n...n..T.%&X.....7.d_.".KA..T.J..Z.....w6D..e.e...=s......S.x..G=.....8"S.%/..|.....8=y1....:2...;.B.(K.I.W.kE../>....Z.r?.7<.~....t...BJ.i../.J...tz......7..!.J,.#..v.....9.Y....YQ....?|t............$V.@....zp...;!TU.M.......A..N.....[..V...&....9..xm..d2F.m..`.N......&.A.DU.....y.4....4....`8...\.|...y...q.]^~......@qXor....Ik..3.@+..V~d...........?7k...`.C.P.ZT.....QF-E.{..+5!... .6..(.i..`m....._~..e.n5.`0..z...Qr..IF.E..9Y.....r~ [.@8...k2*...$....n...orX'#..&........X....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):551
                                                                Entropy (8bit):7.319024742694981
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2HRd4HSOKRcIzpsbPjUdb4pndLBaXeeFUDqtCmN09:HS2HRd4HSBR5KbPognzadIb
                                                                MD5:731657BF68ECC98F0DBE29095CCB88F7
                                                                SHA1:D3B49C3AD148EC96F3088371715121D32EAA7843
                                                                SHA-256:F95DA774191F393BA0EB0436B4CB22920C5F880ED51010177E6E9189CD36C44A
                                                                SHA-512:DE50FC25578922C8BE31D869B70FC0559C965022D6BCCF71DE6CDD541B424DB67E1AE1032AEBAAE03DF66744A27344194AA7994C9CE84317D1AFD1B437D9AA9E
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....04.k......IDAT(..R.j.Q..}..z.%..h.N..OHa../H.......E>!HPl...F\.+n|f..1.*......9.v.\H.Z.&4M{.u.~>.....w>w....v...)"......"...a....@....n.kN.`.kH.)...K..kY..N.0..#1...=..s...A..0M.\..p%.R...B.b..f3..........."......q.J&...).N.b....5A......@.&.c.!.d...\.Z.Vu..V....."H.xO$...e.HX,....WL.`....F....."...m[bu..c.B.u.u..PB..4...U..._.]..*....KY...l<..a .v..>.s.4.....f#..}0..d2.8A#......*wUU...}.N.?.p=rlJ+.J.n..J#.......7\.R.-.c%....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):593
                                                                Entropy (8bit):7.479894563773081
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIniUpZzmH9D1hP79P2J2ySk9BvSpqKu6kZPdiaXVygV271:giUpMDrD8J2ySMKIZoaX0gV271
                                                                MD5:FFCCEC64441F01C7AA82069BB8D5E9D9
                                                                SHA1:45C02522F48129065104E1C9B4E6AC63434CC7D9
                                                                SHA-256:B8CEB44936275B37F8D08F71F01F223866CEE50E53182D529A3768514A8C7662
                                                                SHA-512:E8709643F6C4CBAA98F7BF870028664324DE673141F1B9FCE995A03D011C4374817846DCED739B4A3DD37D315A474F739ACAD2933ACA63C67FA0216356B8E608
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<.....IDAT(S...n.@.....I#;.X.j...U,.@..x..Bx.D.....W..X.b...Fqq.Z.RED8...3.s..l.H..9s...9:D)..1^..m.........R.@...>.T...97..=..z[......i7Q...<...F...di.......R....]...F...u.......W?41&v.6.O^.%ko.\".qH...)....$..z.NJe{o....."..N....NgXDK.q...y...d.@.q].20.9..(...A.a|~.J..F..$..2pn....$....N.4.2AR.R......`"3..R_....[v.h.n.!...5Gq..QA.Y,.....\..Z....{.h.............mU-..T.Ga..0.{....w..$K..?oN....4KW......'^py.fd..L.)L.z.O(..D..)H...............<....o....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):137
                                                                Entropy (8bit):5.815385299502723
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8ll1Aqg/ml90lvGdw1CwHTQ5NsEZxKG2mpFbp:6v/lhPW/WqgmnBdw1CFNsgdLbp
                                                                MD5:CE4C02BA4708A1AAB1572A9148A94B95
                                                                SHA1:E90673F72B063A610E7383EB7DAFEC7F0BD35549
                                                                SHA-256:6E1332235BB51B2E29B244E5056A6C82015A5FEE79DB2D3A553CD6610DC3BB04
                                                                SHA-512:902C214744235E7CA936D2B16215B63500BA980C00ADFD3773D2EFA65E12FD3EB34DA4F430024BEF2F781F762E4A938778C6AD71AF6D86A9CF02EF53C41E1233
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...PIDAT8.c`......._..........H1.....8....XIu.... ..b+..E.$..(.+. ...( .4.e@x4..G..6.g...t....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):636
                                                                Entropy (8bit):7.494209461570772
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIniUpZVqDOd94j4MwzQPlA89rnKP69TRUQMGsVc7:giUpXjBMwMPlA8BZ9OFGsk
                                                                MD5:FE02DBEC1FBF19F2525E9C87E3023C7C
                                                                SHA1:9503756A6C1CB9C742B6852F121B6D8092C06578
                                                                SHA-256:CB2D73D2E08790836F67F4CCA213206C071F2215D65CCD0099EDD2B9A912B578
                                                                SHA-512:CADBCCEE87CB20DA46E1E4BD9241EE22CF7BA6DE9B8ECAD2D1F3831A8AAE5D0061663F57815BCA19F2580C824EC599891726A240292E6AB289013A6AE971E2A0
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<.....IDAT(.U..k.A.....^.W.Mj*.D.P.^..._. .BJJ.h.....Kv...&B..............H.....6..1.22s..t:............4=.......#.#\]..s......./.....t..{;.....+<y|.4=Dr..(*....>..d.]7h>8.{yT...N.........m...c...NO.X....V...F.7. ....n.io.n...I.T.2..F....q+`..$.0...!...P.{U`..1...'.J..B.w..1.!...<...J..[.........j...A.<.c...A~...R.Z<...85@.KI\....1..m........\v....FU....`.T.e.#......_`.rC].s^.S.r]W... _.C.Cu...ju.....5._...P....r..^A.r\^|.$y...&..<......y.e..s\.....dc.....!O..qE.h...I..s..Z...?...4f%......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):139
                                                                Entropy (8bit):5.9354638900987355
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8ll3MOgkBQTBlH/DVgPMWwnPUmLdeAkhBsF6c4V1B/0wXjp:6v/lhPW/cOlcBZKkWoLdePhq2BcwTp
                                                                MD5:5EACCA1FC3A11F7E844B3809D9CAA537
                                                                SHA1:86AF79F715B3921E507068558EEDC94EAAC677C6
                                                                SHA-256:57A9751B8A85FD13C3F0C9EEAEB3B905D7B8802779EFE407E13444468A15C396
                                                                SHA-512:997D5D631FF90CAD01D1613A347BF2C1F9D0723AF29A5CA52494BBEF97F4FA50040B171FD371F8A8FD31DDA2933EF0752ABC3056625A9DB747BC5E24EB6F7CD2
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...RIDAT8.c`...........0h)._..` f....!...P9J....@.F.....;%....@,EI`..b.J....<..a.....z...l....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:GIMP XCF image data, version 0, 32 x 32, RGB Color
                                                                Category:dropped
                                                                Size (bytes):3977
                                                                Entropy (8bit):5.413488066014333
                                                                Encrypted:false
                                                                SSDEEP:48:7dsNCv/C/CVGhkFTKfyeeocjI4Dc8oPjZ/narUX0Zwnc1ZHHdOkdsFVpAa:KcQ2Gyejc0QoPjZ/KKgwniLsFVpAa
                                                                MD5:1339E8669A986ACB3CCA794EF7E67ABB
                                                                SHA1:8295D74B144481F86B928D0C9A2F16AE0FF86F7C
                                                                SHA-256:4D58C67A4095BE33201E16C2545B28DEF1CBA2D7690F0540877866CFC7ACE230
                                                                SHA-512:DF9AA421947EF90713D0F9D2648803DDC975DB7FDB67F2941A9CA7FD489C9734081FE085C4ED4335C798A05CE2028D84C22A4948C558FDCBE86593CFEBB6A796
                                                                Malicious:false
                                                                Preview:gimp xcf file.... ... .....................B...B..............?........................gimp-image-grid.........(style solid).(fgcolor (color-rgba 0.000000 0.000000 0.000000 1.000000)).(bgcolor (color-rgba 1.000000 1.000000 1.000000 1.000000)).(xspacing 10.000000).(yspacing 10.000000).(spacing-unit inches).(xoffset 0.000000).(yoffset 0.000000).(offset-unit inches).................................5........... ... ........New Layer............l...............................................................................................................+...........=....... ... .......Q....... ... ...a....E...............................#.E...............................#.E...............................#.E.............Vq.q.W......?......?......8......8..............#.... ... ........New Layer#4............................................................................................................................'................... ... ............... ... .........................."..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):206
                                                                Entropy (8bit):6.093633689706192
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/f19VNtTlMGBSCghX2AGBIcDV6fr66Vp:6v/7uTVPTChXCBN8fJ7
                                                                MD5:2DE4E41A0E31A4C0FBB2D7FC3CBC31CE
                                                                SHA1:0704F540352C579647D28E5E7821D7CA7FCC6613
                                                                SHA-256:FBEC4D0BC6ED3DFDADADFFD10EB9F04058DFC11E7248DD73814E7806E58795FA
                                                                SHA-512:FE60C53AADB80B6B922E17B822710A6820046C07D2742694BDF3019DD025EB8ABF4366849BE789E122B7053D5B7798D1CEAA9A296C3D007C557D95CDFFEC0115
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....bKGD..............pHYs...........~.....tIME...../..v[....[IDAT8.c...?.50.A.o.../...hx)T.h.x....Lp..yI..?..D2......F.@....P1..[.....C ..4...m4A.G..F...=.G....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1555
                                                                Entropy (8bit):7.796645823149652
                                                                Encrypted:false
                                                                SSDEEP:24:oqhLS0rCCBSazjoXK2RM1EpIuNF0piVLDlZLfciK3ZCHBJW:VjrBBSFXKP1ECuNF0piVLDlBfcOM
                                                                MD5:486390A2CE5B4CC1393AC254780A7C7C
                                                                SHA1:4305181EC1910A666A47C3715D27F5CA6991D688
                                                                SHA-256:AB3BDFDFEED5743FD4AF47B0BA6AAAD914661DCE381A6FF8C8C8994363F83909
                                                                SHA-512:F3F6051BA679C6F329A18E97F12CB6FFD9ED18D0F054C79ED9F2FB5D23F0484A12DB0FD16CD47F52B67E3D617F9BE728F9BECC850CF6A61FE9B74ED9701C2DD1
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sRGB.........bKGD.......C......pHYs.........B(.x....tIME......._......IDATX.WIO#G...+;.Ab.@B$...&...Q.?B2Q...[...8!qEB......bK.....-!..n.....Twlfh.T.v....Wv...eY....Fjiii.R.|..T*.:..a.^.@.U..Z.......~yyy{vv....F.."..NOO....z...S...+....:;;. ...n</....^.xx(_^^.'''.;...mmm..eU...^....011....L.......-...y..Vx...}...A.X,...>..............G....|?99.077.=00.......L&..h._..e..*..U(X....w......w...?.;;;_.........`_www[___..@.Q.H.O..........$,..r.J.P.nnnV..{....{j.....B@..c....!....u....C"P4M.b...V`./<,|.....t...J6...^...H.3..-m.}..5..)..A.0.-Z...!.......V....".:....Y#..z$^H.......eZBa.[..cXd....P:f.P>.&...<....-..v.2..J..DV-.5..i.Z....F....u E.%9...(p....Bpu...Gp...P.]..j.....U..i.!b...*..I.NF(.5.."-.n..L.V.1I.L.D>-..2..Ih..}.J*.`;.......u..*..0..=CC+.P.B.i.@...+..............:1....N%.M<e.....XAUF.W.Sb.M.f.=G...*.be..j.'/...$#.H..0...^......=..u.1s7.B......L....RO.L.Y....T....].Lk..SS..I(..4.Lwf.3N...=...sF#..o9.MK."`...
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):137
                                                                Entropy (8bit):5.807754777184353
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8ll1AqgRtKq2HYGHgsG0z4H1iBLq/bp:6v/lhPW/WqoKq24Psjz4H1ipep
                                                                MD5:BDBB9972D9B7265AD10EDB04A9C2E239
                                                                SHA1:DCA1CBFD90B5C644E37DBB6748227E3EB472E0C8
                                                                SHA-256:866FC4117FC8B133D84C9AC96D13A37E99EBF626CEA47F0E8B059B6641FFC7C3
                                                                SHA-512:BA6059567C6EF35161BD3A82D320EFB8E16435EBFF9CA851AC724A58F45726621BCF7F380DBD2A94A29B5DD919FEF294E7440B31F2B2FACC42AAA1968144020D
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...PIDAT8.c`......._..)5...#.8..y(1.....\C..8.. .[.TCX.8........b...+@.Abr.Ip....2g..F.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):434
                                                                Entropy (8bit):7.191504491746101
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMfbllDGOEGFo+bciyq44LnHolz:HSbHCOEUo/W4EHa
                                                                MD5:7E5A76C4CF167C7549FAD937DC8B3DA3
                                                                SHA1:7BDBE8BE6737C51C292AA8F51F9586DB0432AB39
                                                                SHA-256:77D9DBC6CC93882EEC1BA969D14AD6C0FDEFE35302F0F930751C4B5BAED2ABFE
                                                                SHA-512:30D230F3F7A62425D92B5227D482E000741C34769BB88CB0F4EDABA782D3834892D9C0A1BC4468DA667951FF489453FD2B3B426ADC38BF6BA5EA34CEEACCC077
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME........A.....2IDAT(...j.@...O..b......l..>....v..U.....X.t.L....x.{.Q.n....A.m/).jG-..)..~....2-...Ey..jQY....u=4Mcr......<.i..7.....*.....(..s..i....*.+.......!...^V.v.. .f..b1H..E.Yh.w.........7..$...5..R.....f.~.T.l+..^.<.....'&I.1..pG'...i...d2.0...DQt..Yny.".`]....%@.)?L;.u..........yK.....s~.}...?.8.Ty2y.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):194
                                                                Entropy (8bit):6.478660891705174
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8llsAX81qfqjovwzflWfXbbt8i7ltydfIxDGKuQ11iEUvWK2K1:6v/lhPW/sAXkDokflSoAkpOKtMyldp
                                                                MD5:88BC92E4CF3288BA93CAF398950874CD
                                                                SHA1:F1B9F2C5EF5566C5BD983B5E1B3DFF17B06412F2
                                                                SHA-256:258CD3545E4E4A9CF32F31FBD1AAF19869118F2B32CC8AB88C421D53F0A63D6D
                                                                SHA-512:07DCA4BFC9581F425D7BAAB13E91668A0F1C832518DE7E98C0F872A305401B68B1D1C6DB56A81CF55A81E6587DD57168AF49D5676FF24C07A0BF6B0E04FADF8B
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...!..a......I.h..y......U...,.@3:O..E!x/......Q.@..9........{..b..U.0...&HQ.5........P.W ..;......hc.3.....B.}........h..f...;l^.. *.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):195
                                                                Entropy (8bit):6.589496150082679
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/YkNWoInpCU14phhk1NWMUGHgyU/Hljp:6v/7uSoIpCUKhhDMUrymlN
                                                                MD5:3043F969482A1E805E6DCA44A6072881
                                                                SHA1:B5764E5B1B26D11737D9307A70E14403E7063A4A
                                                                SHA-256:10A3799ABAABF93F03FD86A23FAFC6C68EB04B5BFB86497F04505DF151E1177E
                                                                SHA-512:3BEAAFABEEF07E3BB7E95DC6C761157C38B9B2B2BDB99C517C073AA137950BFE010C0BDFCC29E955B6A46D6BEED4AB4D8D8D1EF580DD23E8A6B0F471E1FEB4D3
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...?..A...E....F'.j....DG.U$......N.|.....r..k.d.,..$4P.)R..}.F/.h..)...Q..c.%.x.t.8.jc....).......,p.3.i.k...v.F...X....^...Y.........q.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1442
                                                                Entropy (8bit):7.754161124979248
                                                                Encrypted:false
                                                                SSDEEP:24:oq2vym+9kVWUOASjz39hd/9uinkxIyJubx/98nDDJFPyvfCDFHTCyFm+3wTf8f4C:aqmzV9az39z9hnkx+2DfyyD9TFAAwTfI
                                                                MD5:46934D3CAA685BB0DBECF20BAB8BC317
                                                                SHA1:DD61BF668D265AB3FBB61C6CB6CF25778632154F
                                                                SHA-256:AC57AEA1D66661974EA2922733661B27D26D3C2026321E77A2A9ACE1CDAD558C
                                                                SHA-512:BCB6D969F8823196652B4093988719C9F51940890D212A0E743CC887C46BE3DAD00D95B47970F1E682F3A40E7F7216EBFD4B37626AE130FE57F7F3CEBA718AE4
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sRGB.........bKGD.......C......pHYs.........B(.x....tIME.......E......"IDATX.W.J,W....jm.A#>AA$......$....q.....!B.Cp..;1...p((...G=.Vyve...+...>g._....q.:..[__/.--}.....w..X.s.....y...N.EN..9.<koo.smmmknn...!V.b...OOO.8==....'........;;;}...}z..+.....vrr.8<<.........._....755.............r___G[[[+....%...z...\..T*..........Ay|||.........O...w......._utt..D{.T*.......1H..;.Z-......u......?........../....J.......m....F.=D+Rk.....PP.\..Ix....Z?;;.666...}.xW.{Z\...j....c...X1..zm.>..y.!...S.u.....o=l..n..._.f....R..P.."....~..8......l..`.;..B\........>.A...7..Q.F..4..=./.B.......eY..$.<..r....A..$.$.<.`)...........C...V...8.......^.....D&........r..Y9.K.....8..C.....%.UV;*....^. .d.....v. ......M...X..M..zR...H...'..'._dS..P.?..2S.MT......4$.....k...=.eL.^z.....X.e+.......$..sG..qm.vB.........&..I..+W....Q. ,.M.+.-Q..$<!.t....wi.rA..(v.kW..&.p.-.(..u+.j.5.y.....2N.....0....kW....5.y).J1. xDW...x..0.d.p.\S.d......l
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):208
                                                                Entropy (8bit):6.056729441397141
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/f19VINtlMv+YftbtCETdkth4EN0QIVp:6v/7uTVI6T6T4ENRI7
                                                                MD5:3DBA17AB50E1923EB74BF395677EFA06
                                                                SHA1:F293297F4127A788E07D365FD4AB5EB19C7383C4
                                                                SHA-256:33BF303743432947AF7E5E4FCFE7A7FF453FCFBFA6ABDC24671071B7C205DA84
                                                                SHA-512:618BFD415108DDB51B7A1D1003D5E40A417BA36F612EF6FBB5F627AE7FDA2388AC2F08F8BFBE5CF6F172DF26737773C902A85FD98DEFB0CD7DE94B3CFF77FAD6
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....bKGD..............pHYs...........~.....tIME.....,"E......]IDAT8.c...?.50.AT5....(1......../%. 9.._.!`19........,....5..a) ^..?)5....@|...F.<.F.h^..A..p..:.j=....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):69
                                                                Entropy (8bit):4.258998795700668
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPlv5hrl6hJbF/k3ollkup:6v/lhPZcJq4ldp
                                                                MD5:A7204A9D9C26A12DD3C0B069EFD8ACAC
                                                                SHA1:5E1E54C75D7D83147DD57DCCBCC5302D1798B21E
                                                                SHA-256:FA56F736618C032485F27BA183FF0D5226006E2080CF20813AF1C6A7B93F4AA3
                                                                SHA-512:7401056BE66AE9CDAF9EFEF6DBA0F96384964DA491F538C35C283419EE819F767D6BFC601E2FEF8445FA25A447A5550C6CD8986330329981B852940EC334F08F
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.....................IDAT..c..`.......%......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):333
                                                                Entropy (8bit):6.65458733329839
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhP6IcHMRfCCllSJPwlzkv8z8zKWHCB9mowuVIRmCtIyWDoKby2Fb/67YEFp:6v/7iIGMfbllL5zMKWHCBBIRwyW0KbzG
                                                                MD5:16CE13BC8208F1C0B9422FFAFBC46C6E
                                                                SHA1:FB6B11EE39E0143A056385B25761FCB0E9ED980B
                                                                SHA-256:1EC3BD426CCE1B1BD23664ADCC11FE51D04DE791FADB6A731DE7EB5076B26163
                                                                SHA-512:46EB74547599EED50ED554DCAD5567198D20AAEF7B8D0F2F22E1912224F381F91F5501E4985B007945FC5D4A12B85ED0E06184168F6EE614135C8AFAE13334A5
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME......'.i.h....IDAT(.c`..@VV.WNN.]FF.WJJ.OZZ...............Z...B..Alsss.SSS......,CCC..$.q``.\XX.5N.UUU......pII..N.3g.4....'N.h.S..;U.]+..hXf...j85>~....+j.O..>~..$......8s..+....?..?..{'...{./_.H.}.y..0.15c..B......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):559
                                                                Entropy (8bit):7.393060209024772
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H1ClNHN+5CWPctjcNirsMD0YrO5kOBMlz:HS2HkHeCmPGxbibO9
                                                                MD5:C720EFDABF3F8B47BD07FCFE80AF5608
                                                                SHA1:A63400832DC55C911113C0176DA2EE6DF04F5D4F
                                                                SHA-256:C81909BB15E1417A075DB27E1FA348C9371F68BF55B434FC70FB28FD5AED37AD
                                                                SHA-512:1EF5ADCDE29FC4316DB7292D53741C3330BF17203B24EFDB6D1112413763FE37822BBDD9008B0C0E7A2210FA519D56922CB574C23043A12954FEF9ECDCBF382D
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....0..a......IDAT(.U..j.A.....#.B.B...H!.Jc..". !u.@.&.E .`X.Pl....].s....\f...=g..\.b.z..,.j:.S;.N.<.>.....N..4....=...f.*..{.BA<..t*..$..f.........r]..Z..*....iI&....H............J...@A.X,>@I.....q..b..T.Vu...._,./.v....3...}_'...Q]...H;a....T*.c..n.m1...g..J..#J)..\\>....#.C..D.3...d\.^^....q%hlse.....~..L.f.L.LaZ..g.Jw...n....y.......>....M1.I4.. ...@...A.1... . |.lV..[C.A.n.P.U*.T.\.r.... ..8..FK...#w;..y.r...]...............IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1128
                                                                Entropy (8bit):7.702657785044095
                                                                Encrypted:false
                                                                SSDEEP:24:CiUpjur3mHiYuZssTwiTn7JgcOc/irhx1F613aC8BLZ2cL/Fsc:CNpj23hnNTwiTPzU6t+JI4FN
                                                                MD5:3F6A543B6C75ACB2EE000A3BAC7B9A59
                                                                SHA1:A53275A9B4F65393301A1C787B67E87FFDA8234F
                                                                SHA-256:3FACB849498CFA7CCF96BF7B02C5792C0DC49374EA7DDDC8F78E7ED53A96C72B
                                                                SHA-512:E9E98AFF394E4ADAEA3C79096BD8DC865EF539D67F9E3030FEB7F4FACAACC1278606592228A19733AF99128966530CEC1363E9C6DAB6C555DFC0D8C7ADB51517
                                                                Malicious:false
                                                                Preview:.PNG........IHDR... ... .....szz.....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<.....IDATX..=SSA...........G.+F....._daaaa..a.....JG+.... 7$ww=g.ws..A/n.~.>.y..+}......=%.Tn..m.....Bt.....N..'.....Z.'...........;....[.d.....~.....9.LI.?>W.........It.W..m...N...x&8>.....}....0....JoU,<X$G..m..YV......w..L...:n..FJ..!......."|.......C)........)p...)F....[.Y..{..jZ@.j.s5xv.W.|L&./.^.u..y....h..4.9b..}$..q.....".....{..p..9;.s..Ul.............^......p...d+.....u......tZ...B......d..Z.....q.....'H.}...g.jl....~a.ng...m.....mw.fp..0....,MI..v.W..7........l8.s.K..*.2....qB..|:.\[...Nje...!..L.^q.Z.hU..f..35s..hK.......R.. $.-..:.......7.p6N.i.+.....u..!RE8..L&...U+...s.x.O.s.H.U.R.E..>z.".......".DB.....9F.......h...W.<.....KH.DO.}.q.!.*....<8.c.J...A.|.S..}.d..ZL......vh....<.#.......W.i..+...m....p...8..Q......A....7..f.sk=.....!.%........tY...S.+...t.Y....1.97P!..a....a.%.m9[~I..K.?..tB.v.L&.[-.h...D...J'......Q'4...59.......I.s..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):220
                                                                Entropy (8bit):6.113077361175645
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/CsQH4dKcDA/M+DPu45sC93H5Adp:6v/7ugHcZuK45sC9X5C
                                                                MD5:0BAE3C12DFF85642E6DEBB90607258F0
                                                                SHA1:2B369328373C449DA154FEEC4235464F53AC27FB
                                                                SHA-256:8C41C0E27B9D85D5D49BF44F00A096FA18680E85077FFEB9EC65750F1EFAAA41
                                                                SHA-512:D86BAF78EECDFB96E857D1749BB0580F6230F83D54D4F4843F94EC6335AF339D22560A00907E897A9BB427200305B83056B4649321ABE0C719DDCA89549639D0
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....sBIT....|.d.....pHYs...........~.....tEXtSoftware.www.inkscape.org..<....YIDAT8.c...?.50.A.. w v.. ) .....X.\...x...X..#. . ..d./ .&. . >...\.b^R..ze1.^...M... .1.....d.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):437
                                                                Entropy (8bit):7.172409807946269
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMfbllRNTwF4Aca6vxsbrVnsgP7F9J6Jz17:HSbHRhwF4A56vuZ/Z6t17
                                                                MD5:E51360FDC759C15DEF4ED591275F6E37
                                                                SHA1:723E725BAB93316AA5CBEEAF65A782777DD28983
                                                                SHA-256:559FD805D661B05A7B67119EF93067D6BF076D5A92470F343332D80EB6C67168
                                                                SHA-512:8BE34022F9188993A642A10A31D3AA05865254C69134726F5C1891E6537AF94A6E625D63A6E8D3C058A10E49A60D03C407AD8D6D70F09452D91957680D99E115
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME........Oj....5IDAT(..IN.@........7n.....\.3@....0&2...._./..J.Tu..5.8.fQ...;......|....*...[.$..>.#..z_A.,....|;.i.^.2^...5...R..U..y.,.8<...<.-;cJ)..E.(.0.....Z.s]..B....:..1.;dud...P..D.G.J..4Ml/.l..!.3.H....q.I..H..a.....I.uK`..^ ...s...2gL..\..(h@!.....R(S...8....a...K.kAf..."V.h0...N?v..}.~..c...t$!&.lo?..z...qm....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):194
                                                                Entropy (8bit):6.427379953657502
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8llsAX81qfqjovwzflWfXb0oWhAm2KWmLk8vJvP+u3tKDhqcl1:6v/lhPW/sAXkDokflFoWhAmtW6k8ZUbp
                                                                MD5:830FC62D759022DDBC665F1D8D2E9164
                                                                SHA1:84FBC1F8F3770905AB365D465C956756FD62E15A
                                                                SHA-256:0D0ED367EC6578DD5DB6A3637A5CFBF6DDEEB1CE12953C1DF09FEF8F8BD897AA
                                                                SHA-512:B948DD792BC0379AFF1DB46A8ABFE5803005E3C5C1BC2F2ED382C4D5AF09DCCA7C8F98400B46B0C5CC1100CD492A8D1C3B90A5BE9B2C5EA2537DAA7911B3458C
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...!..a......I.h..y......U...,.@3:O..E!x/.~..h..f|.u.....4.]hc.3.....@.!v...!.+PC.k\=.A.....1...0A.*H.c..{.Qb..RTA..r.(P.@......;'...!\.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):5.703022629772099
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8lli9uOgkBCvMibqMGuNGpNfodyfsiB1p:6v/lhPW/i9uOliMibqMGjAMkijp
                                                                MD5:65B820457098F3E41079DB7B024D6911
                                                                SHA1:2D35F7523C5F990B810FAD7E2DFB1E2E46DC94AB
                                                                SHA-256:3CA8816EC6B9E88958D7D33C3532CE57223E5B3454D2AE329A54C964590034D6
                                                                SHA-512:52FAD1A53340EE03016E6B63364EE937BBA8C1FCBC8F491011D707102100F9BFCBB62C5D0B9D3F40BF8CEF48E4E9566271019CBA10CD57C4ACFA05EF210DF4E8
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...GIDAT8.c`......./...0.....X.R...8..S.....(5..#.X...EQjP.4.x(.l...........g.*Uug....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):324
                                                                Entropy (8bit):6.776590990847706
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhP6IcHMRfCCllSP7k0Rt64huUPOfsIuDRWi9I1z2He4hsCvJgVm/kup:6v/7iIGMfbll8g0RciuU2fy9I1zg3lJP
                                                                MD5:389BCEA15865028B56A0A70C87E13DCA
                                                                SHA1:B771E6A3E73B2B3E4B440B2E59D98E9D7F3B60C7
                                                                SHA-256:5CAA4636ADE7C9B36E257D1AB01D06FDA59310781F4C1E5B527342D5DD8B8DE3
                                                                SHA-512:BDD82387E62B1726B402B1BE8B87CD2BF02C794A77525E4780A96DAE71E6CBF5F17261706A161A7AE1FDB8F15542DD2A3046ABE0A3328B5139C99F9F9CDDDFA3
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME......*........IDAT(.....0....Uh..C#`....&._...p%..qs.....H...K:....E.S...u....TU.+.R5M..B.m..y.._... ..Zk9M.`.}*.>..C..8.:..I...8.....a.v.......h.b..A....n.T...C...c.%...G..i.2J.+.J)GB...wY......:...,.D.Y?..F..Z.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):135
                                                                Entropy (8bit):5.763983120472731
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPljll8llrAkxHgbcMktxY8ot4sUnG/QgjOD4l+dCKolkup:6v/lhPW/skd/Mktx+thzjOciCflkup
                                                                MD5:C1E1CF920D57580A1337044D9244B41A
                                                                SHA1:2713C8C06B08A204042B3BF92F6E31724E965E81
                                                                SHA-256:8BFC445B29843719FB37F265F727D4E9E6F6C0814F054A6330C096022CA7995A
                                                                SHA-512:87968296D3A160EEA1C3CE012300DF21CC59ED57ADE023B76E9238AE37F491B3F585663CBC4ED86A99EA1E3C4E392672E0CEA803A2641C9F05651E62240FF358
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W...NIDAT8.c`...........(5D.....\......S.8....1D..#...QjP...A.....E^C3P....z.......g...7.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):193
                                                                Entropy (8bit):6.5470203907323725
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPW/bkgGNdjs2jOTS3Bs077TxUVxhlup:6v/7uzkgG7Y2yU14lc
                                                                MD5:8FB0652E37E5375EFBFFC85E000333EC
                                                                SHA1:98DF46702AB67C5CFF30922BE409209CEA30A6B5
                                                                SHA-256:90939B8E3B4A568724143D056A93CD7B5528D4841A9D11EA0A4B11C2A35A4E03
                                                                SHA-512:EF67A9624AA003A77724CB90F456A84181746E585003B31AE714A2870FFB3B2F069382CD7DA464FDE6BA68C37A94AE42CCB58B80E0608D41EEF30A81260D5545
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.............V.W....IDAT8...1..Q...Aa....R......h..~,...:..)..S.7.f...r.I...Rd...a...X..g<p...tBE3\.....&.rU^.WW..!FTF{.5....8b.>.1.o.,.O..........i......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):556
                                                                Entropy (8bit):7.316549998180671
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H9fw3E/3lkWcxh66ScOaqgx531nDqLwzIdjzRvL77:HS2H9YU/eWIfScvbnDzzchvLH
                                                                MD5:E4118A159AC2AAB1876E440CF770CA3D
                                                                SHA1:27A28242395D33530A955D2D6FE479A9D45DB0CC
                                                                SHA-256:08268FF255BFD01B6AA0184ECD06B5A0C48D016BC429D3B155B7149A8CD10FDF
                                                                SHA-512:611EAC1EB04097730CD7B8D9C52FF7DA5D2F741E8C4A54F291C0137B75DD326F42CF35AEDBDB17D153BA20845904BE9F1F3753069B36D3050E907FA5C3D3461A
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....0;..]....IDAT(SmR-o.A....;.8.5.....T..V`+....6.....L-..... ...Q........L2...y3ogF;..BI.Rq5M{.u.t8...3......{..j3..) @O.|$...b..q..z.......F3$x....$.4..l6...[.B..<...R4..E....k.r.E.^.X.K..b...|...J0..F.g..y&.TM&.n>.......).@[Uv.Gx...z...G)..X.hT.-,...XL...V....\.g.W....).. ."..<..Z.N.j.d..a...D..8).L.`...b.F{0.<b..A0.DUB.J:..I.mr.....t-f..V+.d...|.....n~....g.....~NW.'...t:c.....R)....(.d..v.`...V...e.f.!........)...[..-./..._x=t<....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):549
                                                                Entropy (8bit):7.372873904443628
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H0ZF0NS5rNgZK5S80iwpLboX30XuQBMBVEB5Hk:HS2H/NS17A8v1X3wuxYY
                                                                MD5:FA26AC420BEA517A2C4247572E33842E
                                                                SHA1:06DE61402AAA1A2ADC2EF2969E76B7200A9D13AA
                                                                SHA-256:8D8451A732FA6662F6FCE32CCF6751E421C6FFC7C5B819C29AB1482967B05FFA
                                                                SHA-512:8850CFCD06A82FA41D4B30F88DE5485857B2BD1B548CEC4A7F38B78E3427AEDA01B44762161D8352501F6AE0EBBAEE82AF71F52296CCB93399B4C01C6864D382
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....0.[.......IDAT(.mR.j.@........(.".."~C.n...Q.!...n.u.O.).+A.*..&>{..)..\2s.{....z...m..W.T.r.<0.....po.. 0X..Az..3....J....L.S..f.r..P....."I.T..hx.fS...../.lV.(..z-.~_..qx>..HV....b..J%Z...@.........e.X.A.%....LFN..&1.&..X.......l.,.T..@....m]`...j...b.s ...c.Z+.N.$..R.@.i..s.H.-....).0W`....I..D.x/xF7.(>.~..LuCf.L$..a...`.}...q....=5.! ..r.........I...6..8.]rnF...j...j5..-...|>....$@.nG.9. .":..!...x<....._.....`7....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):517
                                                                Entropy (8bit):7.3380534299819
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H4ZZG1CXGrA0JI/88sXEZ1gBxPibGo1+bsI:HS2H4ZGCWXC/tHZ10PiaJP
                                                                MD5:156D5836B29559FD2A8AFACFA2931192
                                                                SHA1:D92B24898B7483591E5B088C60D05B73355AD0EC
                                                                SHA-256:ECE2829963DECBC954FDBC7F831451D36F1248EBDEAAC181B68AEBEC00BE3555
                                                                SHA-512:591CCEED7768A3D6C87A9DC7EE34F9B1A1463AEE30C184027C24294901179BA9C6BFF697FD7004E22F12605D45CB7BC18FFE1C9D7D798A7AB40004FF36FBC656
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....2.........IDAT(S..Ij.Q....v..a..m..(...}...!.&!'.W.=T...mW.....<t..X...$.....E..G...R..;.i>.C.z._...p8|.n...o6.w....r..r9.8..M...h4.....;q...7.M.t.Z.Z-[*..P((.Z.R.......l`.AN.%.LVR..aY.!...@...#......^i4........r...nG..^....f....gd`.~0.9hD,.S.a..>e2.8T......E..t..x.= d..".._@..$...Bq..m=....f..n#.,.t.Z..EW...o.1w1B]p .....0b....w.^'...=.`p:.tD|.d2...i..\..=9......j......<1..._...+."..V|....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):502
                                                                Entropy (8bit):7.307082621377148
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H5kGLptWrJMNbLtUWrPwIfYSA2go4aOq07:HS2H6G16JEbSuff8hnaOq07
                                                                MD5:9BBFAFFA43A8745739977748E1680DAB
                                                                SHA1:A2DE96CC6B8D6A22F2E517ED8828A0E65769C6EB
                                                                SHA-256:EAD5682AA1875AC0664177D32B817A0BE555B90AABB88DD8FA914FAF42125896
                                                                SHA-512:3E1E77835D3786D1FFAE02EAEFD41FEF7BD55955F08806C176A5E5A06169029F07E194D001927E5AEAD066FA41C90CA1B41E354F274C3AA1C6A78EF0E37717E1
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....2...i....vIDAT(S.RKj.Q.4..=....*.h.......].....y...E.j.O.....d.,.7..._.......`0.....p8|...}[..H......t..j...l`.6F....2G..x.D.7...^..8......d..{e%..H$.\...x..j..~....B.R..d......}d2.d.Y..u,..l.[.v;....P(.4..D..+^....<.."..*.g..Q.Z..r...4!E>..LT*....n..l4.*FQ..VI.....&..........eYOVM6...@....5...L.T*.J...p.rq..=."p2.`6.a:.....I5.s........I..\.@..F....rB.b..I....'...r..O...{7.\....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):69
                                                                Entropy (8bit):4.258998795700668
                                                                Encrypted:false
                                                                SSDEEP:3:yionv//thPlv5hrl6hJbF/k3ollkup:6v/lhPZcJq4ldp
                                                                MD5:A7204A9D9C26A12DD3C0B069EFD8ACAC
                                                                SHA1:5E1E54C75D7D83147DD57DCCBCC5302D1798B21E
                                                                SHA-256:FA56F736618C032485F27BA183FF0D5226006E2080CF20813AF1C6A7B93F4AA3
                                                                SHA-512:7401056BE66AE9CDAF9EFEF6DBA0F96384964DA491F538C35C283419EE819F767D6BFC601E2FEF8445FA25A447A5550C6CD8986330329981B852940EC334F08F
                                                                Malicious:false
                                                                Preview:.PNG........IHDR.....................IDAT..c..`.......%......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):333
                                                                Entropy (8bit):6.65458733329839
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhP6IcHMRfCCllSJPwlzkv8z8zKWHCB9mowuVIRmCtIyWDoKby2Fb/67YEFp:6v/7iIGMfbllL5zMKWHCBBIRwyW0KbzG
                                                                MD5:16CE13BC8208F1C0B9422FFAFBC46C6E
                                                                SHA1:FB6B11EE39E0143A056385B25761FCB0E9ED980B
                                                                SHA-256:1EC3BD426CCE1B1BD23664ADCC11FE51D04DE791FADB6A731DE7EB5076B26163
                                                                SHA-512:46EB74547599EED50ED554DCAD5567198D20AAEF7B8D0F2F22E1912224F381F91F5501E4985B007945FC5D4A12B85ED0E06184168F6EE614135C8AFAE13334A5
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME......'.i.h....IDAT(.c`..@VV.WNN.]FF.WJJ.OZZ...............Z...B..Alsss.SSS......,CCC..$.q``.\XX.5N.UUU......pII..N.3g.4....'N.h.S..;U.]+..hXf...j85>~....+j.O..>~..$......8s..+....?..?..{'...{./_.H.}.y..0.15c..B......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):324
                                                                Entropy (8bit):6.776590990847706
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhP6IcHMRfCCllSP7k0Rt64huUPOfsIuDRWi9I1z2He4hsCvJgVm/kup:6v/7iIGMfbll8g0RciuU2fy9I1zg3lJP
                                                                MD5:389BCEA15865028B56A0A70C87E13DCA
                                                                SHA1:B771E6A3E73B2B3E4B440B2E59D98E9D7F3B60C7
                                                                SHA-256:5CAA4636ADE7C9B36E257D1AB01D06FDA59310781F4C1E5B527342D5DD8B8DE3
                                                                SHA-512:BDD82387E62B1726B402B1BE8B87CD2BF02C794A77525E4780A96DAE71E6CBF5F17261706A161A7AE1FDB8F15542DD2A3046ABE0A3328B5139C99F9F9CDDDFA3
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME......*........IDAT(.....0....Uh..C#`....&._...p%..qs.....H...K:....E.S...u....TU.+.R5M..B.m..y.._... ..Zk9M.`.}*.>..C..8.:..I...8.....a.v.......h.b..A....n.T...C...c.%...G..i.2J.+.J)GB...wY......:...,.D.Y?..F..Z.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):593
                                                                Entropy (8bit):7.479894563773081
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIniUpZzmH9D1hP79P2J2ySk9BvSpqKu6kZPdiaXVygV271:giUpMDrD8J2ySMKIZoaX0gV271
                                                                MD5:FFCCEC64441F01C7AA82069BB8D5E9D9
                                                                SHA1:45C02522F48129065104E1C9B4E6AC63434CC7D9
                                                                SHA-256:B8CEB44936275B37F8D08F71F01F223866CEE50E53182D529A3768514A8C7662
                                                                SHA-512:E8709643F6C4CBAA98F7BF870028664324DE673141F1B9FCE995A03D011C4374817846DCED739B4A3DD37D315A474F739ACAD2933ACA63C67FA0216356B8E608
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<.....IDAT(S...n.@.....I#;.X.j...U,.@..x..Bx.D.....W..X.b...Fqq.Z.RED8...3.s..l.H..9s...9:D)..1^..m.........R.@...>.T...97..=..z[......i7Q...<...F...di.......R....]...F...u.......W?41&v.6.O^.%ko.\".qH...)....$..z.NJe{o....."..N....NgXDK.q...y...d.@.q].20.9..(...A.a|~.J..F..$..2pn....$....N.4.2AR.R......`"3..R_....[v.h.n.!...5Gq..QA.Y,.....\..Z....{.h.............mU-..T.Ga..0.{....w..$K..?oN....4KW......'^py.fd..L.)L.z.O(..D..)H...............<....o....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):502
                                                                Entropy (8bit):7.307082621377148
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H5kGLptWrJMNbLtUWrPwIfYSA2go4aOq07:HS2H6G16JEbSuff8hnaOq07
                                                                MD5:9BBFAFFA43A8745739977748E1680DAB
                                                                SHA1:A2DE96CC6B8D6A22F2E517ED8828A0E65769C6EB
                                                                SHA-256:EAD5682AA1875AC0664177D32B817A0BE555B90AABB88DD8FA914FAF42125896
                                                                SHA-512:3E1E77835D3786D1FFAE02EAEFD41FEF7BD55955F08806C176A5E5A06169029F07E194D001927E5AEAD066FA41C90CA1B41E354F274C3AA1C6A78EF0E37717E1
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....2...i....vIDAT(S.RKj.Q.4..=....*.h.......].....y...E.j.O.....d.,.7..._.......`0.....p8|...}[..H......t..j...l`.6F....2G..x.D.7...^..8......d..{e%..H$.\...x..j..~....B.R..d......}d2.d.Y..u,..l.[.v;....P(.4..D..+^....<.."..*.g..Q.Z..r...4!E>..LT*....n..l4.*FQ..VI.....&..........eYOVM6...@....5...L.T*.J...p.rq..=."p2.`6.a:.....I5.s........I..\.@..F....rB.b..I....'...r..O...{7.\....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):517
                                                                Entropy (8bit):7.3380534299819
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H4ZZG1CXGrA0JI/88sXEZ1gBxPibGo1+bsI:HS2H4ZGCWXC/tHZ10PiaJP
                                                                MD5:156D5836B29559FD2A8AFACFA2931192
                                                                SHA1:D92B24898B7483591E5B088C60D05B73355AD0EC
                                                                SHA-256:ECE2829963DECBC954FDBC7F831451D36F1248EBDEAAC181B68AEBEC00BE3555
                                                                SHA-512:591CCEED7768A3D6C87A9DC7EE34F9B1A1463AEE30C184027C24294901179BA9C6BFF697FD7004E22F12605D45CB7BC18FFE1C9D7D798A7AB40004FF36FBC656
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....2.........IDAT(S..Ij.Q....v..a..m..(...}...!.&!'.W.=T...mW.....<t..X...$.....E..G...R..;.i>.C.z._...p8|.n...o6.w....r..r9.8..M...h4.....;q...7.M.t.Z.Z-[*..P((.Z.R.......l`.AN.%.LVR..aY.!...@...#......^i4........r...nG..^....f....gd`.~0.9hD,.S.a..>e2.8T......E..t..x.= d..".._@..$...Bq..m=....f..n#.,.t.Z..EW...o.1w1B]p .....0b....w.^'...=.`p:.tD|.d2...i..\..=9......j......<1..._...+."..V|....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):636
                                                                Entropy (8bit):7.494209461570772
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIniUpZVqDOd94j4MwzQPlA89rnKP69TRUQMGsVc7:giUpXjBMwMPlA8BZ9OFGsk
                                                                MD5:FE02DBEC1FBF19F2525E9C87E3023C7C
                                                                SHA1:9503756A6C1CB9C742B6852F121B6D8092C06578
                                                                SHA-256:CB2D73D2E08790836F67F4CCA213206C071F2215D65CCD0099EDD2B9A912B578
                                                                SHA-512:CADBCCEE87CB20DA46E1E4BD9241EE22CF7BA6DE9B8ECAD2D1F3831A8AAE5D0061663F57815BCA19F2580C824EC599891726A240292E6AB289013A6AE971E2A0
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sBIT....|.d.....pHYs.........B(.x....tEXtSoftware.www.inkscape.org..<.....IDAT(.U..k.A.....^.W.Mj*.D.P.^..._. .BJJ.h.....Kv...&B..............H.....6..1.22s..t:............4=.......#.#\]..s......./.....t..{;.....+<y|.4=Dr..(*....>..d.]7h>8.{yT...N.........m...c...NO.X....V...F.7. ....n.io.n...I.T.2..F....q+`..$.0...!...P.{U`..1...'.J..B.w..1.!...<...J..[.........j...A.<.c...A~...R.Z<...85@.KI\....1..m........\v....FU....`.T.e.#......_`.rC].s^.S.r]W... _.C.Cu...ju.....5._...P....r..^A.r\^|.$y...&..<......y.e..s\.....dc.....!O..qE.h...I..s..Z...?...4f%......IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):559
                                                                Entropy (8bit):7.393060209024772
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H1ClNHN+5CWPctjcNirsMD0YrO5kOBMlz:HS2HkHeCmPGxbibO9
                                                                MD5:C720EFDABF3F8B47BD07FCFE80AF5608
                                                                SHA1:A63400832DC55C911113C0176DA2EE6DF04F5D4F
                                                                SHA-256:C81909BB15E1417A075DB27E1FA348C9371F68BF55B434FC70FB28FD5AED37AD
                                                                SHA-512:1EF5ADCDE29FC4316DB7292D53741C3330BF17203B24EFDB6D1112413763FE37822BBDD9008B0C0E7A2210FA519D56922CB574C23043A12954FEF9ECDCBF382D
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....0..a......IDAT(.U..j.A.....#.B.B...H!.Jc..". !u.@.&.E .`X.Pl....].s....\f...=g..\.b.z..,.j:.S;.N.<.>.....N..4....=...f.*..{.BA<..t*..$..f.........r]..Z..*....iI&....H............J...@A.X,>@I.....q..b..T.Vu...._,./.v....3...}_'...Q]...H;a....T*.c..n.m1...g..J..#J)..\\>....#.C..D.3...d\.^^....q%hlse.....~..L.f.L.LaZ..g.Jw...n....y.......>....M1.I4.. ...@...A.1... . |.lV..[C.A.n.P.U*.T.\.r.... ..8..FK...#w;..y.r...]...............IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):549
                                                                Entropy (8bit):7.372873904443628
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H0ZF0NS5rNgZK5S80iwpLboX30XuQBMBVEB5Hk:HS2H/NS17A8v1X3wuxYY
                                                                MD5:FA26AC420BEA517A2C4247572E33842E
                                                                SHA1:06DE61402AAA1A2ADC2EF2969E76B7200A9D13AA
                                                                SHA-256:8D8451A732FA6662F6FCE32CCF6751E421C6FFC7C5B819C29AB1482967B05FFA
                                                                SHA-512:8850CFCD06A82FA41D4B30F88DE5485857B2BD1B548CEC4A7F38B78E3427AEDA01B44762161D8352501F6AE0EBBAEE82AF71F52296CCB93399B4C01C6864D382
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....0.[.......IDAT(.mR.j.@........(.".."~C.n...Q.!...n.u.O.).+A.*..&>{..)..\2s.{....z...m..W.T.r.<0.....po.. 0X..Az..3....J....L.S..f.r..P....."I.T..hx.fS...../.lV.(..z-.~_..qx>..HV....b..J%Z...@.........e.X.A.%....LFN..&1.&..X.......l.,.T..@....m]`...j...b.s ...c.Z+.N.$..R.@.i..s.H.-....).0W`....I..D.x/xF7.(>.~..LuCf.L$..a...`.}...q....=5.! ..r.........I...6..8.]rnF...j...j5..-...|>....$@.nG.9. .":..!...x<....._.....`7....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):641
                                                                Entropy (8bit):7.486329990930914
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2HcHsH4mHgE42VgbsrP2eByHKk8a4JLk++8/1:HS2H8mJJfIsrueEq9z+c1
                                                                MD5:752E6CDC2C92BF4D22712F33A380CB93
                                                                SHA1:07AC399AD6C9F72E97A1304E1324AD20EB42F633
                                                                SHA-256:3294FEF8285A13B09967D3F631F8CE52C2AACC9A07604CD51B70811BED2ED40E
                                                                SHA-512:9DC2C06873DE889B4E26AA9890B93E6FD37D04C73801865861FA46B95C2011BFEEC94B24F37BBD376C43E993FEE58D1C4A221AF09346CE70AF86BF379BD6CCA2
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....1*........IDAT(Se..k.A...|.n...n..T.%&X.....7.d_.".KA..T.J..Z.....w6D..e.e...=s......S.x..G=.....8"S.%/..|.....8=y1....:2...;.B.(K.I.W.kE../>....Z.r?.7<.~....t...BJ.i../.J...tz......7..!.J,.#..v.....9.Y....YQ....?|t............$V.@....zp...;!TU.M.......A..N.....[..V...&....9..xm..d2F.m..`.N......&.A.DU.....y.4....4....`8...\.|...y...q.]^~......@qXor....Ik..3.@+..V~d...........?7k...`.C.P.ZT.....QF-E.{..+5!... .6..(.i..`m....._~..e.n5.`0..z...Qr..IF.E..9Y.....r~ [.@8...k2*...$....n...orX'#..&........X....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):556
                                                                Entropy (8bit):7.316549998180671
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2H9fw3E/3lkWcxh66ScOaqgx531nDqLwzIdjzRvL77:HS2H9YU/eWIfScvbnDzzchvLH
                                                                MD5:E4118A159AC2AAB1876E440CF770CA3D
                                                                SHA1:27A28242395D33530A955D2D6FE479A9D45DB0CC
                                                                SHA-256:08268FF255BFD01B6AA0184ECD06B5A0C48D016BC429D3B155B7149A8CD10FDF
                                                                SHA-512:611EAC1EB04097730CD7B8D9C52FF7DA5D2F741E8C4A54F291C0137B75DD326F42CF35AEDBDB17D153BA20845904BE9F1F3753069B36D3050E907FA5C3D3461A
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....0;..]....IDAT(SmR-o.A....;.8.5.....T..V`+....6.....L-..... ...Q........L2...y3ogF;..BI.Rq5M{.u.t8...3......{..j3..) @O.|$...b..q..z.......F3$x....$.4..l6...[.B..<...R4..E....k.r.E.^.X.K..b...|...J0..F.g..y&.TM&.n>.......).@[Uv.Gx...z...G)..X.hT.-,...XL...V....\.g.W....).. ."..<..Z.N.j.d..a...D..8).L.`...b.F{0.<b..A0.DUB.J:..I.mr.....t-f..V+.d...|.....n~....g.....~NW.'...t:c.....R)....(.d..v.`...V...e.f.!........)...[..-./..._x=t<....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):551
                                                                Entropy (8bit):7.319024742694981
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMf2HRd4HSOKRcIzpsbPjUdb4pndLBaXeeFUDqtCmN09:HS2HRd4HSBR5KbPognzadIb
                                                                MD5:731657BF68ECC98F0DBE29095CCB88F7
                                                                SHA1:D3B49C3AD148EC96F3088371715121D32EAA7843
                                                                SHA-256:F95DA774191F393BA0EB0436B4CB22920C5F880ED51010177E6E9189CD36C44A
                                                                SHA-512:DE50FC25578922C8BE31D869B70FC0559C965022D6BCCF71DE6CDD541B424DB67E1AE1032AEBAAE03DF66744A27344194AA7994C9CE84317D1AFD1B437D9AA9E
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD..............pHYs.........B(.x....tIME.....04.k......IDAT(..R.j.Q..}..z.%..h.N..OHa../H.......E>!HPl...F\.+n|f..1.*......9.v.\H.Z.&4M{.u.~>.....w>w....v...)"......"...a....@....n.kN.`.kH.)...K..kY..N.0..#1...=..s...A..0M.\..p%.R...B.b..f3..........."......q.J&...).N.b....5A......@.&.c.!.d...\.Z.Vu..V....."H.xO$...e.HX,....WL.`....F....."...m[bu..c.B.u.u..PB..4...U..._.]..*....KY...l<..a .v..>.s.4.....f#..}0..d2.8A#......*wUU...}.N.?.p=rlJ+.J.n..J#.......7\.R.-.c%....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):437
                                                                Entropy (8bit):7.172409807946269
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMfbllRNTwF4Aca6vxsbrVnsgP7F9J6Jz17:HSbHRhwF4A56vuZ/Z6t17
                                                                MD5:E51360FDC759C15DEF4ED591275F6E37
                                                                SHA1:723E725BAB93316AA5CBEEAF65A782777DD28983
                                                                SHA-256:559FD805D661B05A7B67119EF93067D6BF076D5A92470F343332D80EB6C67168
                                                                SHA-512:8BE34022F9188993A642A10A31D3AA05865254C69134726F5C1891E6537AF94A6E625D63A6E8D3C058A10E49A60D03C407AD8D6D70F09452D91957680D99E115
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME........Oj....5IDAT(..IN.@........7n.....\.3@....0&2...._./..J.Tu..5.8.fQ...;......|....*...[.$..>.#..z_A.,....|;.i.^.2^...5...R..U..y.,.8<...<.-;cJ)..E.(.0.....Z.s]..B....:..1.;dud...P..D.G.J..4Ml/.l..!.3.H....q.I..H..a.....I.uK`..^ ...s...2gL..\..(h@!.....R(S...8....a...K.kAf..."V.h0...N?v..}.~..c...t$!&.lo?..z...qm....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):434
                                                                Entropy (8bit):7.191504491746101
                                                                Encrypted:false
                                                                SSDEEP:12:6v/7iIGMfbllDGOEGFo+bciyq44LnHolz:HSbHCOEUo/W4EHa
                                                                MD5:7E5A76C4CF167C7549FAD937DC8B3DA3
                                                                SHA1:7BDBE8BE6737C51C292AA8F51F9586DB0432AB39
                                                                SHA-256:77D9DBC6CC93882EEC1BA969D14AD6C0FDEFE35302F0F930751C4B5BAED2ABFE
                                                                SHA-512:30D230F3F7A62425D92B5227D482E000741C34769BB88CB0F4EDABA782D3834892D9C0A1BC4468DA667951FF489453FD2B3B426ADC38BF6BA5EA34CEEACCC077
                                                                Malicious:false
                                                                Preview:.PNG........IHDR..............H-.....sRGB.........bKGD._._._.4.....pHYs.........B(.x....tIME........A.....2IDAT(...j.@...O..b......l..>....v..U.....X.t.L....x.{.Q.n....A.m/).jG-..)..~....2-...Ey..jQY....u=4Mcr......<.i..7.....*.....(..s..i....*.+.......!...^V.v.. .f..b1H..E.Yh.w.........7..$...5..R.....f.~.T.l+..^.<.....'&I.1..pG'...i...d2.0...DQt..Yny.".`]....%@.)?L;.u..........yK.....s~.}...?.8.Ty2y.....IEND.B`.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):15008
                                                                Entropy (8bit):5.270725103917416
                                                                Encrypted:false
                                                                SSDEEP:384:s/nUm8NYR/fiYM8LXMX5fs38Ffx4Bf0lAT9:s/nX00iY/XMXq38FxK0lq
                                                                MD5:64C98ACB587FC7E4F237EADAA84A591D
                                                                SHA1:B92C3D066E67FC230D56E690AE1CC21222265614
                                                                SHA-256:6E8E87C68E7EFC5CCF8694042649DE3EBA01EC1DF242C22D40842AF885D1118D
                                                                SHA-512:B1542C0E3D5411CD8581150FE2D81401C93686E7E43754E8BF8F78ACBEB73A041F7D9223D7DC8072C132273D1DB6EB9917ED04F9F2123C1CEA4062E59CD7F129
                                                                Malicious:false
                                                                Preview:#.# This file is part of RawTherapee..#.# Copyright (c) 2004-2011 Gabor Horvath <hgabor@rawtherapee.com>.#.# RawTherapee is free software: you can redistribute it and/or modify.# it under the terms of the GNU General Public License as published by.# the Free Software Foundation, either version 3 of the License, or.# (at your option) any later version..# .# RawTherapee is distributed in the hope that it will be useful,.# but WITHOUT ANY WARRANTY; without even the implied warranty of.# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the.# GNU General Public License for more details..#.# You should have received a copy of the GNU General Public License.# along with RawTherapee. If not, see <http://www.gnu.org/licenses/>..#..# Please keep this gtkrc in sync with the other ones from Clearlooks based themes...gtk-color-scheme = "rt_base_color:#ffffff\nrt_fg_color:#101010\nrt_tooltip_fg_color:#000000\nrt_selected_bg_color:#7C99AD\nrt_selected_fg_color:#ffffff\nrt_text_c
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):3276
                                                                Entropy (8bit):5.106247394055059
                                                                Encrypted:false
                                                                SSDEEP:48:9yjeGR/K4ysHjBcKKFyY+fwVsFcDIYMkSnvRN55FQcsFnZFnFveKW+dFKeQFqer/:sjbR/njBz1QsFcUYnSR3QzwLwS
                                                                MD5:72CACEE801EFA43AE137706B6A355D87
                                                                SHA1:20AB5543B96FB36AE8540DF45022229E0A1EE780
                                                                SHA-256:72EC12AEC248C88FA8D0EC7D3185F74006E45D092736B9EF8C15692C69A1355E
                                                                SHA-512:FB2769296F2CF702E7387B6F959FE02EFC2AC96C9E782472C6CA93BD9E8C76FBE2BD725AF227E7444452735B96757C3ACFF51BE5D6A1FB6226E5FD7583D00FC6
                                                                Malicious:false
                                                                Preview:#.# This file is part of RawTherapee..#.# Copyright (c) 2004-2011 Gabor Horvath <hgabor@rawtherapee.com>.#.# RawTherapee is free software: you can redistribute it and/or modify.# it under the terms of the GNU General Public License as published by.# the Free Software Foundation, either version 3 of the License, or.# (at your option) any later version..# .# RawTherapee is distributed in the hope that it will be useful,.# but WITHOUT ANY WARRANTY; without even the implied warranty of.# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the.# GNU General Public License for more details..#.# You should have received a copy of the GNU General Public License.# along with RawTherapee. If not, see <http://www.gnu.org/licenses/>..#..# Please keep this gtkrc in sync with the other ones from Clearlooks based themes...gtk-color-scheme = "salt_pinch:#95B0DB\nbase_color:#dddddd\nfg_color:#0A0A0A\ntooltip_fg_color:#000000\nselected_bg_color:#95B0DB\nselected_fg_color:#FFFFFF\ntext
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):24
                                                                Entropy (8bit):4.136842188131013
                                                                Encrypted:false
                                                                SSDEEP:3:1ERdiAqRv:1+MJ
                                                                MD5:2BE834BAC02BFB69E1E7935A62A6B8FB
                                                                SHA1:6165F776AC298A991E497B03E9C2E1797ED81029
                                                                SHA-256:113DBDDEAEE29ED930AF404A0C0D5356A95D9D1B53BAE343F2782A29B5D4DBC9
                                                                SHA-512:1F3BC0176EC15394E6CAD295A077F33C66BD9FEA4598715B5EDED4DDE397DE519FFC6D171E9DB53A09A50929FE6D8EDE5D4D51B5B786A0C3BE6481CB7A5BA4FC
                                                                Malicious:false
                                                                Preview:[General].Iconset=Light.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):24
                                                                Entropy (8bit):4.136842188131013
                                                                Encrypted:false
                                                                SSDEEP:3:1ERdiAqRv:1+MJ
                                                                MD5:2BE834BAC02BFB69E1E7935A62A6B8FB
                                                                SHA1:6165F776AC298A991E497B03E9C2E1797ED81029
                                                                SHA-256:113DBDDEAEE29ED930AF404A0C0D5356A95D9D1B53BAE343F2782A29B5D4DBC9
                                                                SHA-512:1F3BC0176EC15394E6CAD295A077F33C66BD9FEA4598715B5EDED4DDE397DE519FFC6D171E9DB53A09A50929FE6D8EDE5D4D51B5B786A0C3BE6481CB7A5BA4FC
                                                                Malicious:false
                                                                Preview:[General].Iconset=Light.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):3276
                                                                Entropy (8bit):5.106247394055059
                                                                Encrypted:false
                                                                SSDEEP:48:9yjeGR/K4ysHjBcKKFyY+fwVsFcDIYMkSnvRN55FQcsFnZFnFveKW+dFKeQFqer/:sjbR/njBz1QsFcUYnSR3QzwLwS
                                                                MD5:72CACEE801EFA43AE137706B6A355D87
                                                                SHA1:20AB5543B96FB36AE8540DF45022229E0A1EE780
                                                                SHA-256:72EC12AEC248C88FA8D0EC7D3185F74006E45D092736B9EF8C15692C69A1355E
                                                                SHA-512:FB2769296F2CF702E7387B6F959FE02EFC2AC96C9E782472C6CA93BD9E8C76FBE2BD725AF227E7444452735B96757C3ACFF51BE5D6A1FB6226E5FD7583D00FC6
                                                                Malicious:false
                                                                Preview:#.# This file is part of RawTherapee..#.# Copyright (c) 2004-2011 Gabor Horvath <hgabor@rawtherapee.com>.#.# RawTherapee is free software: you can redistribute it and/or modify.# it under the terms of the GNU General Public License as published by.# the Free Software Foundation, either version 3 of the License, or.# (at your option) any later version..# .# RawTherapee is distributed in the hope that it will be useful,.# but WITHOUT ANY WARRANTY; without even the implied warranty of.# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the.# GNU General Public License for more details..#.# You should have received a copy of the GNU General Public License.# along with RawTherapee. If not, see <http://www.gnu.org/licenses/>..#..# Please keep this gtkrc in sync with the other ones from Clearlooks based themes...gtk-color-scheme = "salt_pinch:#95B0DB\nbase_color:#dddddd\nfg_color:#0A0A0A\ntooltip_fg_color:#000000\nselected_bg_color:#95B0DB\nselected_fg_color:#FFFFFF\ntext
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:ASCII text
                                                                Category:dropped
                                                                Size (bytes):24
                                                                Entropy (8bit):4.136842188131013
                                                                Encrypted:false
                                                                SSDEEP:3:1ERdiAqRv:1+MJ
                                                                MD5:2BE834BAC02BFB69E1E7935A62A6B8FB
                                                                SHA1:6165F776AC298A991E497B03E9C2E1797ED81029
                                                                SHA-256:113DBDDEAEE29ED930AF404A0C0D5356A95D9D1B53BAE343F2782A29B5D4DBC9
                                                                SHA-512:1F3BC0176EC15394E6CAD295A077F33C66BD9FEA4598715B5EDED4DDE397DE519FFC6D171E9DB53A09A50929FE6D8EDE5D4D51B5B786A0C3BE6481CB7A5BA4FC
                                                                Malicious:false
                                                                Preview:[General].Iconset=Light.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):720373
                                                                Entropy (8bit):6.507155477779126
                                                                Encrypted:false
                                                                SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyFZ:nu7eEYCP8trP837szHUA60SLtcV3E9k9
                                                                MD5:74DE04C1DA3B854F12AE2E6C63AACF1D
                                                                SHA1:18B6BEA4B7F04DF51BA3FCE01FDCB2A016714EB1
                                                                SHA-256:CEB3C30CD6ED1CA29EE3A058D953BF2C7FE3B31452B4B8DD219D06D4138310E5
                                                                SHA-512:F9E834F68ADCB2729ADF97AD96CBA376E9639D0348C326A0375B32623BBB5C08C782C5DFCC3505889179E6F9193AF0B8B6508F57D34CCD2F027C7E9A56FC077C
                                                                Malicious:true
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:InnoSetup Log Zexter Video Codec, version 0x30, 10214 bytes, 887849\user, "C:\Users\user\AppData\Local\Zexter Video Codec"
                                                                Category:dropped
                                                                Size (bytes):10214
                                                                Entropy (8bit):4.973629968718704
                                                                Encrypted:false
                                                                SSDEEP:48:XC5AyMdLBoMFbNpUcLUhS3J9J+4bLVO3471o5Bu0gf5y5M5iY5iV5iSs5iF5iT5t:LhWMdNpxUS59J+eOIhjlHIQN+kbk4/
                                                                MD5:7AA35AE79D1D73CB0DB5F7374806ED48
                                                                SHA1:557CB3B28C76D28055E5BA3426EA785E8470A95A
                                                                SHA-256:3A416D8B96F7773E18C21705C73F92B274B7AB6204479BB24ACF33519334D732
                                                                SHA-512:DE55BB4AE7470E40C5880F60FD0EFF44DA56F6CC1261A90809AF42AD31EA4385B0BC738E6AFA322ADDA8962D0465BA8828F0BCB99158720075774B6F051B6040
                                                                Malicious:false
                                                                Preview:Inno Setup Uninstall Log (b)....................................Zexter Video Codec..............................................................................................................Zexter Video Codec..............................................................................................................0...N....'..%...............................................................................................................y.Q`..................U....887849.user2C:\Users\user\AppData\Local\Zexter Video Codec...........'...... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:U
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):720373
                                                                Entropy (8bit):6.507155477779126
                                                                Encrypted:false
                                                                SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyFZ:nu7eEYCP8trP837szHUA60SLtcV3E9k9
                                                                MD5:74DE04C1DA3B854F12AE2E6C63AACF1D
                                                                SHA1:18B6BEA4B7F04DF51BA3FCE01FDCB2A016714EB1
                                                                SHA-256:CEB3C30CD6ED1CA29EE3A058D953BF2C7FE3B31452B4B8DD219D06D4138310E5
                                                                SHA-512:F9E834F68ADCB2729ADF97AD96CBA376E9639D0348C326A0375B32623BBB5C08C782C5DFCC3505889179E6F9193AF0B8B6508F57D34CCD2F027C7E9A56FC077C
                                                                Malicious:true
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:modified
                                                                Size (bytes):2586624
                                                                Entropy (8bit):7.0380268176847265
                                                                Encrypted:false
                                                                SSDEEP:49152:rW4JtS+gCIx4ICoueGCMZuQfgQxQ/jgYsoPZnvhuN4Q28g:JIx4I9XGCMEQIqJ3WnYN4Q28g
                                                                MD5:96504F6C70AD91FDC3D32BF7C3FA2696
                                                                SHA1:5253C2279D7AD28D355DF486FA54698AFF453FEF
                                                                SHA-256:307B073C7B8C4FBDE223BD99B0A76D99ED8743DA27208CA59A437F9FE9F4C904
                                                                SHA-512:E2D1BAF4E09DD36842DAFF59D0ACD4B4D94594309D01DA653095557850C47FE75E7844078C146D7489A1A3B8966A1E39C41A943285BC4E7CC9134D2A03E15C4A
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....u.L..................".........(."......."...@...........................'......#(......................................."......p#..`............................................................................"..............................text.....".......".................`....rdata........".......".............@..@.data...8d....#..0....".............@....rsrc....b...p#..b....#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):98626
                                                                Entropy (8bit):6.478068795827396
                                                                Encrypted:false
                                                                SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                                MD5:70CA53E8B46464CCF956D157501D367A
                                                                SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                                SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                                SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.99956848961753
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                • Inno Setup installer (109748/4) 1.08%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                File name:Xzm9fAfKhB.exe
                                                                File size:8'354'805 bytes
                                                                MD5:d9cd9f798cb8012ce2834ac5e21ed371
                                                                SHA1:a6879cd6c787a50e5f0168ecf6caddc4a0b4a822
                                                                SHA256:e91f69194702e3b8568ba1c3db43fd187118e1fdabfb6eaef764feff8057c608
                                                                SHA512:7801fd7206ab7f7f58467308ae97f8503bbeb6f539287debee22cc4c176c24352b43915a23bd197040215a5bad975083261aa5c1ce609dc00e91fe7038d2808e
                                                                SSDEEP:98304:NJ9RE3OlQsmOHm0yhkfgtGmftfPFupSAlZrT4M+d4hBpFSfHG9n+aa51hHusSZoX:X7F/HF+kYtlySAlHVSPf51hHujoFB9HR
                                                                TLSH:A086330161C66FFEDB49FDB8FC64C0186A337E7A4C38A5A97A1CE14EF1375466980638
                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                Icon Hash:2d2e3797b32b2b99
                                                                Entrypoint:0x409c40
                                                                Entrypoint Section:CODE
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:1
                                                                OS Version Minor:0
                                                                File Version Major:1
                                                                File Version Minor:0
                                                                Subsystem Version Major:1
                                                                Subsystem Version Minor:0
                                                                Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                Instruction
                                                                push ebp
                                                                mov ebp, esp
                                                                add esp, FFFFFFC4h
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                xor eax, eax
                                                                mov dword ptr [ebp-10h], eax
                                                                mov dword ptr [ebp-24h], eax
                                                                call 00007F5A98E43D7Bh
                                                                call 00007F5A98E44F82h
                                                                call 00007F5A98E45211h
                                                                call 00007F5A98E47248h
                                                                call 00007F5A98E4728Fh
                                                                call 00007F5A98E49BBEh
                                                                call 00007F5A98E49D25h
                                                                xor eax, eax
                                                                push ebp
                                                                push 0040A2FCh
                                                                push dword ptr fs:[eax]
                                                                mov dword ptr fs:[eax], esp
                                                                xor edx, edx
                                                                push ebp
                                                                push 0040A2C5h
                                                                push dword ptr fs:[edx]
                                                                mov dword ptr fs:[edx], esp
                                                                mov eax, dword ptr [0040C014h]
                                                                call 00007F5A98E4A78Bh
                                                                call 00007F5A98E4A3BEh
                                                                lea edx, dword ptr [ebp-10h]
                                                                xor eax, eax
                                                                call 00007F5A98E47878h
                                                                mov edx, dword ptr [ebp-10h]
                                                                mov eax, 0040CE24h
                                                                call 00007F5A98E43E27h
                                                                push 00000002h
                                                                push 00000000h
                                                                push 00000001h
                                                                mov ecx, dword ptr [0040CE24h]
                                                                mov dl, 01h
                                                                mov eax, 0040738Ch
                                                                call 00007F5A98E48107h
                                                                mov dword ptr [0040CE28h], eax
                                                                xor edx, edx
                                                                push ebp
                                                                push 0040A27Dh
                                                                push dword ptr fs:[edx]
                                                                mov dword ptr fs:[edx], esp
                                                                call 00007F5A98E4A7FBh
                                                                mov dword ptr [0040CE30h], eax
                                                                mov eax, dword ptr [0040CE30h]
                                                                cmp dword ptr [eax+0Ch], 01h
                                                                jne 00007F5A98E4A93Ah
                                                                mov eax, dword ptr [0040CE30h]
                                                                mov edx, 00000028h
                                                                call 00007F5A98E48508h
                                                                mov edx, dword ptr [00000030h]
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                .rsrc0x110000x2c000x2c00c26e3142a72c7bbf589aa93fdeaa93b0False0.3229758522727273data4.462274643136113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                RT_STRING0x125740x2f2data0.35543766578249336
                                                                RT_STRING0x128680x30cdata0.3871794871794872
                                                                RT_STRING0x12b740x2cedata0.42618384401114207
                                                                RT_STRING0x12e440x68data0.75
                                                                RT_STRING0x12eac0xb4data0.6277777777777778
                                                                RT_STRING0x12f600xaedata0.5344827586206896
                                                                RT_RCDATA0x130100x2cdata1.1818181818181819
                                                                RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2764900662251656
                                                                RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                DLLImport
                                                                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                user32.dllMessageBoxA
                                                                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                comctl32.dllInitCommonControls
                                                                advapi32.dllAdjustTokenPrivileges
                                                                Language of compilation systemCountry where language is spokenMap
                                                                DutchNetherlands
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-03T08:40:03.557729+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649719185.208.158.24880TCP
                                                                2024-10-03T08:40:03.909597+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649719185.208.158.24880TCP
                                                                2024-10-03T08:40:04.779447+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649720185.208.158.24880TCP
                                                                2024-10-03T08:40:05.143029+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649720185.208.158.24880TCP
                                                                2024-10-03T08:40:05.951562+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649721185.208.158.24880TCP
                                                                2024-10-03T08:40:06.298863+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649721185.208.158.24880TCP
                                                                2024-10-03T08:40:06.641793+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649721185.208.158.24880TCP
                                                                2024-10-03T08:40:08.480326+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649722185.208.158.24880TCP
                                                                2024-10-03T08:40:09.298643+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649723185.208.158.24880TCP
                                                                2024-10-03T08:40:09.646073+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649723185.208.158.24880TCP
                                                                2024-10-03T08:40:10.475796+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649725185.208.158.24880TCP
                                                                2024-10-03T08:40:11.291408+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649726185.208.158.24880TCP
                                                                2024-10-03T08:40:12.100767+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649727185.208.158.24880TCP
                                                                2024-10-03T08:40:13.668740+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649728185.208.158.24880TCP
                                                                2024-10-03T08:40:14.021882+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649728185.208.158.24880TCP
                                                                2024-10-03T08:40:14.854908+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649729185.208.158.24880TCP
                                                                2024-10-03T08:40:15.683032+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649730185.208.158.24880TCP
                                                                2024-10-03T08:40:16.486986+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649731185.208.158.24880TCP
                                                                2024-10-03T08:40:16.829817+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649731185.208.158.24880TCP
                                                                2024-10-03T08:40:17.173081+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649731185.208.158.24880TCP
                                                                2024-10-03T08:40:18.004594+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649732185.208.158.24880TCP
                                                                2024-10-03T08:40:18.836718+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649733185.208.158.24880TCP
                                                                2024-10-03T08:40:19.657844+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649734185.208.158.24880TCP
                                                                2024-10-03T08:40:20.004208+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649734185.208.158.24880TCP
                                                                2024-10-03T08:40:20.809757+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649735185.208.158.24880TCP
                                                                2024-10-03T08:40:21.156403+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649735185.208.158.24880TCP
                                                                2024-10-03T08:40:21.502908+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649735185.208.158.24880TCP
                                                                2024-10-03T08:40:22.341955+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649736185.208.158.24880TCP
                                                                2024-10-03T08:40:22.693294+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649736185.208.158.24880TCP
                                                                2024-10-03T08:40:23.674627+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649737185.208.158.24880TCP
                                                                2024-10-03T08:40:24.482732+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649738185.208.158.24880TCP
                                                                2024-10-03T08:40:24.980157+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649738185.208.158.24880TCP
                                                                2024-10-03T08:40:25.798356+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649739185.208.158.24880TCP
                                                                2024-10-03T08:40:26.606860+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649740185.208.158.24880TCP
                                                                2024-10-03T08:40:26.953733+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649740185.208.158.24880TCP
                                                                2024-10-03T08:40:27.298083+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649740185.208.158.24880TCP
                                                                2024-10-03T08:40:27.641462+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649740185.208.158.24880TCP
                                                                2024-10-03T08:40:28.465099+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649741185.208.158.24880TCP
                                                                2024-10-03T08:40:30.265711+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649742185.208.158.24880TCP
                                                                2024-10-03T08:40:31.104830+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649743185.208.158.24880TCP
                                                                2024-10-03T08:40:32.078905+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:32.454570+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:32.798274+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:33.141264+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:33.485451+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:33.834878+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:34.298286+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:34.648536+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649744185.208.158.24880TCP
                                                                2024-10-03T08:40:35.454533+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649745185.208.158.24880TCP
                                                                2024-10-03T08:40:35.798624+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649745185.208.158.24880TCP
                                                                2024-10-03T08:40:36.145125+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649745185.208.158.24880TCP
                                                                2024-10-03T08:40:36.957264+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649746185.208.158.24880TCP
                                                                2024-10-03T08:40:37.775736+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649748185.208.158.24880TCP
                                                                2024-10-03T08:40:38.577743+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649749185.208.158.24880TCP
                                                                2024-10-03T08:40:38.922676+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649749185.208.158.24880TCP
                                                                2024-10-03T08:40:39.790336+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649750185.208.158.24880TCP
                                                                2024-10-03T08:40:40.601299+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649751185.208.158.24880TCP
                                                                2024-10-03T08:40:41.422965+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649752185.208.158.24880TCP
                                                                2024-10-03T08:40:41.770339+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649752185.208.158.24880TCP
                                                                2024-10-03T08:40:42.584993+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649753185.208.158.24880TCP
                                                                2024-10-03T08:40:43.426932+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649754185.208.158.24880TCP
                                                                2024-10-03T08:40:44.232887+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649755185.208.158.24880TCP
                                                                2024-10-03T08:40:44.580361+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649755185.208.158.24880TCP
                                                                2024-10-03T08:40:44.974483+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649755185.208.158.24880TCP
                                                                2024-10-03T08:40:45.788468+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649756185.208.158.24880TCP
                                                                2024-10-03T08:40:46.620773+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649757185.208.158.24880TCP
                                                                2024-10-03T08:40:47.429110+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649758185.208.158.24880TCP
                                                                2024-10-03T08:40:48.250966+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649759185.208.158.24880TCP
                                                                2024-10-03T08:40:48.821744+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649759185.208.158.24880TCP
                                                                2024-10-03T08:40:49.636214+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649760185.208.158.24880TCP
                                                                2024-10-03T08:40:50.436319+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649761185.208.158.24880TCP
                                                                2024-10-03T08:40:50.782549+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649761185.208.158.24880TCP
                                                                2024-10-03T08:40:51.125825+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649761185.208.158.24880TCP
                                                                2024-10-03T08:40:51.469860+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649761185.208.158.24880TCP
                                                                2024-10-03T08:40:52.430506+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649762185.208.158.24880TCP
                                                                2024-10-03T08:40:53.235582+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649763185.208.158.24880TCP
                                                                2024-10-03T08:40:53.580693+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649763185.208.158.24880TCP
                                                                2024-10-03T08:40:53.923676+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649763185.208.158.24880TCP
                                                                2024-10-03T08:40:54.270652+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649763185.208.158.24880TCP
                                                                2024-10-03T08:40:55.079309+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649764185.208.158.24880TCP
                                                                2024-10-03T08:40:55.913022+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649765185.208.158.24880TCP
                                                                2024-10-03T08:40:56.727880+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649766185.208.158.24880TCP
                                                                2024-10-03T08:40:57.530444+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649767185.208.158.24880TCP
                                                                2024-10-03T08:40:58.436463+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649768185.208.158.24880TCP
                                                                2024-10-03T08:40:59.085837+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649768185.208.158.24880TCP
                                                                2024-10-03T08:40:59.908301+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649769185.208.158.24880TCP
                                                                2024-10-03T08:41:00.252946+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649769185.208.158.24880TCP
                                                                2024-10-03T08:41:01.124506+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649770185.208.158.24880TCP
                                                                2024-10-03T08:41:02.734317+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649771185.208.158.24880TCP
                                                                2024-10-03T08:41:03.541913+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649772185.208.158.24880TCP
                                                                2024-10-03T08:41:04.363758+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649773185.208.158.24880TCP
                                                                2024-10-03T08:41:05.280891+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649774185.208.158.24880TCP
                                                                2024-10-03T08:41:07.092124+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649775185.208.158.24880TCP
                                                                2024-10-03T08:41:07.959005+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649776185.208.158.24880TCP
                                                                2024-10-03T08:41:09.318273+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649777185.208.158.24880TCP
                                                                2024-10-03T08:41:10.152657+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649778185.208.158.24880TCP
                                                                2024-10-03T08:41:10.994314+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649780185.208.158.24880TCP
                                                                2024-10-03T08:41:11.825886+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649781185.208.158.24880TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 3, 2024 08:40:02.628376961 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:02.863717079 CEST8049719185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:02.863802910 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:02.864634037 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:02.869415998 CEST8049719185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:03.557631016 CEST8049719185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:03.557729006 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:03.674933910 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:03.679847002 CEST8049719185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:03.909456968 CEST8049719185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:03.909596920 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.072885036 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.073293924 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.078572989 CEST8049720185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:04.078701019 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.079303980 CEST8049719185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:04.079369068 CEST4971980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.080270052 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.085675955 CEST8049720185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:04.779196978 CEST8049720185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:04.779447079 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.898948908 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:04.903821945 CEST8049720185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:05.142782927 CEST8049720185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:05.143028975 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:05.265054941 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:05.265465021 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:05.270853043 CEST8049720185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:05.270935059 CEST4972080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:05.271133900 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:05.271202087 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:05.271353960 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:05.276333094 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:05.951478958 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:05.951561928 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.062617064 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.067542076 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:06.298695087 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:06.298862934 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.405808926 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.410706043 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:06.641705990 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:06.641793013 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.780739069 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.781013966 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.785868883 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:06.785952091 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.786078930 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.786183119 CEST8049721185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:06.786242962 CEST4972180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:06.790849924 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.480254889 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.480325937 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.482898951 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.482944012 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.484797001 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.484837055 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.486469030 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.486529112 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.593296051 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.593666077 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.598426104 CEST8049722185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.598444939 CEST8049723185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:08.598484039 CEST4972280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.598814011 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.598814011 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:08.603586912 CEST8049723185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:09.298475981 CEST8049723185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:09.298643112 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.405997038 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.410953999 CEST8049723185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:09.645940065 CEST8049723185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:09.646073103 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.767061949 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.771287918 CEST4972580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.772119999 CEST8049723185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:09.772173882 CEST4972380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.776091099 CEST8049725185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:09.776170969 CEST4972580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.776340008 CEST4972580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:09.781088114 CEST8049725185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:10.475730896 CEST8049725185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:10.475795984 CEST4972580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:10.593249083 CEST4972580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:10.593615055 CEST4972680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:10.598491907 CEST8049725185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:10.598507881 CEST8049726185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:10.598593950 CEST4972580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:10.598648071 CEST4972680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:10.598853111 CEST4972680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:10.603899002 CEST8049726185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:11.291286945 CEST8049726185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:11.291408062 CEST4972680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:11.406327963 CEST4972680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:11.406771898 CEST4972780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:11.411674976 CEST8049727185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:11.411758900 CEST8049726185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:11.411808014 CEST4972780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:11.411812067 CEST4972680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:11.412262917 CEST4972780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:11.417156935 CEST8049727185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:12.100610018 CEST8049727185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:12.100766897 CEST4972780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:12.218810081 CEST4972780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:12.219238043 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:12.224129915 CEST8049727185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:12.224148989 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:12.224241972 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:12.224324942 CEST4972780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:12.224473000 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:12.229322910 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:13.668549061 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:13.668603897 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:13.668740034 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:13.668740034 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:13.668791056 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:13.669023037 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:13.780925989 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:13.785836935 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.021795034 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.021882057 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.140773058 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.141207933 CEST4972980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.146133900 CEST8049728185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.146190882 CEST4972880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.146445036 CEST8049729185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.146517992 CEST4972980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.146637917 CEST4972980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.151376963 CEST8049729185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.854753971 CEST8049729185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.854907990 CEST4972980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.968286037 CEST4972980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.968734026 CEST4973080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.973515987 CEST8049730185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.973535061 CEST8049729185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:14.973618984 CEST4973080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.973649025 CEST4972980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.973823071 CEST4973080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:14.978569984 CEST8049730185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:15.682823896 CEST8049730185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:15.683032036 CEST4973080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:15.800786018 CEST4973080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:15.801270008 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:15.806022882 CEST8049730185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:15.806071043 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:15.806102037 CEST4973080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:15.806174040 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:15.806411982 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:15.811233044 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:16.486926079 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:16.486985922 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:16.594657898 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:16.599570990 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:16.829636097 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:16.829817057 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:16.937657118 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:16.942634106 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:17.172575951 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:17.173080921 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:17.301034927 CEST4973280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:17.301075935 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:17.306081057 CEST8049732185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:17.306216002 CEST4973280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:17.306821108 CEST4973280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:17.310920954 CEST8049731185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:17.311005116 CEST4973180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:17.311939955 CEST8049732185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.004415035 CEST8049732185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.004594088 CEST4973280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.124488115 CEST4973280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.125086069 CEST4973380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.129632950 CEST8049732185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.129765034 CEST4973280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.129857063 CEST8049733185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.129940987 CEST4973380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.130326033 CEST4973380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.135072947 CEST8049733185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.836652040 CEST8049733185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.836718082 CEST4973380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.952739000 CEST4973380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.953123093 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.958053112 CEST8049733185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.958067894 CEST8049734185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:18.958174944 CEST4973380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.958216906 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.958450079 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:18.963246107 CEST8049734185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:19.657707930 CEST8049734185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:19.657844067 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:19.765295982 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:19.770184040 CEST8049734185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:20.004149914 CEST8049734185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:20.004208088 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.124816895 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.125233889 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.129893064 CEST8049734185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:20.129972935 CEST4973480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.130028009 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:20.130106926 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.130224943 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.135042906 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:20.809381008 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:20.809756994 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.921127081 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:20.926225901 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:21.156325102 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:21.156403065 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.267410040 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.272597075 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:21.502697945 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:21.502907991 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.624806881 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.625102997 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.629951954 CEST8049736185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:21.630088091 CEST8049735185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:21.630333900 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.630362034 CEST4973580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.630506039 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:21.635240078 CEST8049736185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:22.341828108 CEST8049736185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:22.341954947 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.452673912 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.457597971 CEST8049736185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:22.693164110 CEST8049736185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:22.693294048 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.812444925 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.812768936 CEST4973780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.986002922 CEST8049737185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:22.986095905 CEST4973780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.986327887 CEST4973780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.987173080 CEST8049736185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:22.987270117 CEST4973680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:22.991309881 CEST8049737185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:23.674521923 CEST8049737185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:23.674627066 CEST4973780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:23.797009945 CEST4973780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:23.797396898 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:23.802454948 CEST8049738185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:23.802474976 CEST8049737185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:23.802697897 CEST4973780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:23.802697897 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:23.802931070 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:23.807743073 CEST8049738185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:24.482613087 CEST8049738185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:24.482732058 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:24.594302893 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:24.749682903 CEST8049738185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:24.979993105 CEST8049738185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:24.980156898 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.093549013 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.094012022 CEST4973980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.098805904 CEST8049739185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:25.098943949 CEST4973980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.099147081 CEST4973980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.099266052 CEST8049738185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:25.099328995 CEST4973880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.103903055 CEST8049739185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:25.798125982 CEST8049739185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:25.798356056 CEST4973980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.921396017 CEST4973980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.921791077 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.926620007 CEST8049739185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:25.926681042 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:25.926709890 CEST4973980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.926759958 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.926884890 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:25.931752920 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:26.606780052 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:26.606859922 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:26.718776941 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:26.723635912 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:26.953551054 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:26.953732967 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.063043118 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.067967892 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:27.297996044 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:27.298083067 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.406148911 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.411163092 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:27.641269922 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:27.641462088 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.766570091 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.767507076 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.772195101 CEST8049740185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:27.772332907 CEST4974080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.772802114 CEST8049741185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:27.772939920 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.773305893 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:27.778604031 CEST8049741185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:28.464914083 CEST8049741185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:28.465099096 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:28.579166889 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:28.579565048 CEST4974280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:28.887681961 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:29.497061968 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:29.574079990 CEST8049742185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:29.574095011 CEST8049741185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:29.574109077 CEST8049741185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:29.574122906 CEST8049741185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:29.574307919 CEST4974180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:29.574685097 CEST4974280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:29.574685097 CEST4974280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:29.580543041 CEST8049742185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:30.265495062 CEST8049742185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:30.265711069 CEST4974280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:30.390505075 CEST4974280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:30.390849113 CEST4974380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:30.396399975 CEST8049743185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:30.396503925 CEST4974380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:30.396600008 CEST4974380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:30.397593975 CEST8049742185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:30.397663116 CEST4974280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:30.401535034 CEST8049743185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:31.104674101 CEST8049743185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:31.104830027 CEST4974380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:31.389230013 CEST4974380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:31.392785072 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:31.394659042 CEST8049743185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:31.394828081 CEST4974380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:31.397717953 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:31.397788048 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:31.399708033 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:31.404534101 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:32.078743935 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:32.078905106 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:32.219335079 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:32.224832058 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:32.454421997 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:32.454570055 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:32.562935114 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:32.568295002 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:32.798055887 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:32.798274040 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:32.906284094 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:32.911211014 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:33.141210079 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:33.141263962 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:33.250504017 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:33.255604029 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:33.485387087 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:33.485450983 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:33.599545956 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:33.604491949 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:33.834593058 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:33.834877968 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.063133001 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.068188906 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:34.298094988 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:34.298285961 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.406945944 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.412028074 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:34.648475885 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:34.648535967 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.767955065 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.768330097 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.773308039 CEST8049744185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:34.773400068 CEST4974480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.773410082 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:34.773619890 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.773619890 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:34.778426886 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:35.454287052 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:35.454533100 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:35.562244892 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:35.567157984 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:35.797399998 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:35.798624039 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:35.907480001 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:35.913719893 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:36.144242048 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:36.145124912 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:36.266062021 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:36.266995907 CEST4974680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:36.271444082 CEST8049745185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:36.271783113 CEST8049746185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:36.273219109 CEST4974580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:36.273219109 CEST4974680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:36.273219109 CEST4974680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:36.279200077 CEST8049746185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:36.957178116 CEST8049746185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:36.957263947 CEST4974680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.081142902 CEST4974680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.081489086 CEST4974880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.086402893 CEST8049748185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:37.086481094 CEST4974880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.086533070 CEST8049746185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:37.086584091 CEST4974680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.086796045 CEST4974880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.091820002 CEST8049748185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:37.775580883 CEST8049748185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:37.775736094 CEST4974880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.891371012 CEST4974880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.891777992 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.896631002 CEST8049749185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:37.896656990 CEST8049748185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:37.896847963 CEST4974880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.897097111 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.897097111 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:37.901983023 CEST8049749185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:38.577610970 CEST8049749185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:38.577743053 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:38.687458992 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:38.692293882 CEST8049749185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:38.922528028 CEST8049749185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:38.922676086 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.046519995 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.046835899 CEST4975080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.051675081 CEST8049750185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:39.051759005 CEST8049749185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:39.051857948 CEST4974980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.052006960 CEST4975080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.052006960 CEST4975080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.056782961 CEST8049750185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:39.790052891 CEST8049750185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:39.790335894 CEST4975080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.906405926 CEST4975080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.906800985 CEST4975180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.911686897 CEST8049751185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:39.911757946 CEST8049750185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:39.911793947 CEST4975180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.911896944 CEST4975080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.912134886 CEST4975180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:39.917011023 CEST8049751185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:40.601171970 CEST8049751185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:40.601299047 CEST4975180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:40.718647957 CEST4975180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:40.719034910 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:40.723872900 CEST8049751185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:40.723908901 CEST8049752185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:40.723963022 CEST4975180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:40.724018097 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:40.724133015 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:40.728905916 CEST8049752185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:41.422849894 CEST8049752185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:41.422965050 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.531342030 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.536360979 CEST8049752185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:41.770196915 CEST8049752185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:41.770339012 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.890860081 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.891145945 CEST4975380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.896006107 CEST8049753185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:41.896042109 CEST8049752185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:41.896158934 CEST4975280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.896423101 CEST4975380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.896423101 CEST4975380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:41.901185036 CEST8049753185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:42.584836006 CEST8049753185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:42.584992886 CEST4975380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:42.721718073 CEST4975380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:42.722088099 CEST4975480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:42.727777004 CEST8049754185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:42.727822065 CEST8049753185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:42.728050947 CEST4975380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:42.728072882 CEST4975480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:42.728334904 CEST4975480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:42.733854055 CEST8049754185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:43.426830053 CEST8049754185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:43.426932096 CEST4975480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:43.547018051 CEST4975480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:43.547648907 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:43.552314997 CEST8049754185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:43.552402973 CEST4975480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:43.552701950 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:43.552781105 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:43.552997112 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:43.558027029 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:44.232821941 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:44.232887030 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:44.345263004 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:44.350347996 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:44.580113888 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:44.580360889 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:44.687431097 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:44.692295074 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:44.974201918 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:44.974483013 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.094227076 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.094585896 CEST4975680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.099881887 CEST8049756185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:45.100100040 CEST8049755185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:45.100189924 CEST4975580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.100343943 CEST4975680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.100343943 CEST4975680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.107074976 CEST8049756185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:45.788096905 CEST8049756185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:45.788467884 CEST4975680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.906172037 CEST4975680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.906636953 CEST4975780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.911565065 CEST8049757185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:45.911608934 CEST8049756185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:45.911760092 CEST4975680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.911847115 CEST4975780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.912000895 CEST4975780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:45.916764975 CEST8049757185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:46.620382071 CEST8049757185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:46.620773077 CEST4975780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:46.734771013 CEST4975780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:46.735063076 CEST4975880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:46.740051031 CEST8049758185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:46.740148067 CEST4975880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:46.740303993 CEST8049757185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:46.740361929 CEST4975780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:46.740458965 CEST4975880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:46.745251894 CEST8049758185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:47.428903103 CEST8049758185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:47.429110050 CEST4975880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:47.546802044 CEST4975880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:47.547175884 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:47.552208900 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:47.552252054 CEST8049758185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:47.552340031 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:47.552376032 CEST4975880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:47.552508116 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:47.557295084 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.250814915 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.250966072 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.359740973 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.364517927 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.821665049 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.821743965 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.821926117 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.821974039 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.937870979 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.938328028 CEST4976080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.943314075 CEST8049760185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.943358898 CEST8049759185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:48.943449020 CEST4976080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.943494081 CEST4975980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.943679094 CEST4976080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:48.948503971 CEST8049760185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:49.635982037 CEST8049760185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:49.636214018 CEST4976080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:49.750022888 CEST4976080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:49.750267982 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:49.755183935 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:49.755337000 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:49.755462885 CEST8049760185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:49.755522966 CEST4976080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:49.755646944 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:49.760457993 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:50.436171055 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:50.436319113 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:50.547101974 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:50.552094936 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:50.782444954 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:50.782548904 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:50.890703917 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:50.895802975 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:51.125736952 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:51.125824928 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.234190941 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.239197016 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:51.469795942 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:51.469860077 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.597198963 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.597682953 CEST4976280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.603497982 CEST8049761185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:51.603516102 CEST8049762185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:51.603646040 CEST4976180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.603692055 CEST4976280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.603843927 CEST4976280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:51.608745098 CEST8049762185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:52.430360079 CEST8049762185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:52.430505991 CEST4976280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:52.547820091 CEST4976280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:52.548346043 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:52.552890062 CEST8049762185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:52.553185940 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:52.553296089 CEST4976280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:52.553354025 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:52.553674936 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:52.558453083 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:53.235363960 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:53.235582113 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:53.344419003 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:53.349559069 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:53.580605030 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:53.580693007 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:53.687880993 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:53.692852020 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:53.923546076 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:53.923676014 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.033719063 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.040035009 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:54.270473957 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:54.270652056 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.390762091 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.391129017 CEST4976480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.395958900 CEST8049763185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:54.396096945 CEST4976380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.396199942 CEST8049764185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:54.396286964 CEST4976480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.396403074 CEST4976480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:54.401384115 CEST8049764185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:55.079179049 CEST8049764185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:55.079308987 CEST4976480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:55.218791962 CEST4976480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:55.219211102 CEST4976580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:55.224056005 CEST8049764185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:55.224128008 CEST8049765185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:55.224153996 CEST4976480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:55.224215984 CEST4976580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:55.224386930 CEST4976580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:55.229209900 CEST8049765185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:55.912945032 CEST8049765185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:55.913022041 CEST4976580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.031572104 CEST4976580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.031851053 CEST4976680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.036993980 CEST8049766185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:56.037029982 CEST8049765185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:56.037141085 CEST4976680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.037183046 CEST4976580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.037364960 CEST4976680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.042285919 CEST8049766185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:56.727710962 CEST8049766185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:56.727880001 CEST4976680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.843801975 CEST4976680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.844208002 CEST4976780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.849104881 CEST8049766185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:56.849139929 CEST8049767185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:56.849219084 CEST4976680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.849287987 CEST4976780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.849489927 CEST4976780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:56.854295969 CEST8049767185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:57.530292034 CEST8049767185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:57.530443907 CEST4976780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:57.746351004 CEST4976780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:57.746870995 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:57.751825094 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:57.751910925 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:57.752073050 CEST8049767185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:57.752083063 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:57.752136946 CEST4976780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:57.756921053 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:58.436193943 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:58.436463118 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:58.547574043 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:58.552903891 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.085712910 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.085836887 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.087635994 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.087692022 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.204000950 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.204261065 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.211615086 CEST8049769185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.211661100 CEST8049768185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.211745024 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.211810112 CEST4976880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.211988926 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:40:59.217169046 CEST8049769185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.908010006 CEST8049769185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:40:59.908301115 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.015861988 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.021828890 CEST8049769185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:00.252676010 CEST8049769185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:00.252945900 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.375356913 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.375801086 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.403017998 CEST8049770185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:00.403283119 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.403549910 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.404386044 CEST8049769185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:00.404489040 CEST4976980192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:00.433726072 CEST8049770185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:01.124316931 CEST8049770185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:01.124505997 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.234631062 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.235161066 CEST4977180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.544380903 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.898236990 CEST8049771185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:01.898252964 CEST8049770185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:01.898266077 CEST8049770185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:01.898343086 CEST4977180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.898365974 CEST4977080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.898866892 CEST4977180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:01.909265041 CEST8049771185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:02.734208107 CEST8049771185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:02.734317064 CEST4977180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:02.844472885 CEST4977180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:02.844882965 CEST4977280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:02.850883961 CEST8049771185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:02.850955963 CEST8049772185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:02.851007938 CEST4977180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:02.851058006 CEST4977280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:02.851217985 CEST4977280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:02.857237101 CEST8049772185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:03.541661024 CEST8049772185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:03.541913033 CEST4977280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:03.656825066 CEST4977280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:03.657207012 CEST4977380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:03.662188053 CEST8049773185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:03.662240028 CEST8049772185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:03.662288904 CEST4977380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:03.662338972 CEST4977280192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:03.662544012 CEST4977380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:03.667560101 CEST8049773185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:04.363653898 CEST8049773185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:04.363758087 CEST4977380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:04.515959024 CEST4977380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:04.516375065 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:04.521409035 CEST8049773185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:04.521506071 CEST4977380192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:04.521655083 CEST8049774185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:04.521728992 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:04.521970034 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:04.527009964 CEST8049774185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.280806065 CEST8049774185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.280890942 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.396667957 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.397131920 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.411843061 CEST8049775185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.411916971 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.414280891 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.416812897 CEST8049774185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.416873932 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.653719902 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.676556110 CEST8049774185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.676619053 CEST4977480192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:05.678802013 CEST8049775185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.678966045 CEST8049775185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:05.681850910 CEST8049774185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:07.091998100 CEST8049775185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:07.092123985 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:07.221160889 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:07.221613884 CEST4977680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:07.226814032 CEST8049776185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:07.226973057 CEST4977680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:07.227001905 CEST8049775185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:07.227062941 CEST4977580192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:07.227294922 CEST4977680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:07.232395887 CEST8049776185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:07.958908081 CEST8049776185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:07.959005117 CEST4977680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:08.081571102 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:08.081748962 CEST4977680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:08.086935043 CEST8049777185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:08.087008953 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:08.087143898 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:08.087579012 CEST8049776185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:08.087629080 CEST4977680192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:08.095213890 CEST8049777185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:09.318182945 CEST8049777185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:09.318273067 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.319293976 CEST8049777185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:09.319380045 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.441019058 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.445813894 CEST4977880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.447803974 CEST8049777185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:09.448879004 CEST4977780192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.450723886 CEST8049778185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:09.450923920 CEST4977880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.451809883 CEST4977880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:09.457557917 CEST8049778185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:10.152586937 CEST8049778185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:10.152657032 CEST4977880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:10.270255089 CEST4977880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:10.270916939 CEST4978080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:10.275661945 CEST8049778185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:10.275878906 CEST4977880192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:10.275985003 CEST8049780185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:10.276135921 CEST4978080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:10.276777983 CEST4978080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:10.281650066 CEST8049780185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:10.994122982 CEST8049780185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:10.994313955 CEST4978080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:11.111788988 CEST4978080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:11.112235069 CEST4978180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:11.118211031 CEST8049780185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:11.118282080 CEST8049781185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:11.118333101 CEST4978080192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:11.119035006 CEST4978180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:11.119076967 CEST4978180192.168.2.6185.208.158.248
                                                                Oct 3, 2024 08:41:11.128696918 CEST8049781185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:11.825767040 CEST8049781185.208.158.248192.168.2.6
                                                                Oct 3, 2024 08:41:11.825886011 CEST4978180192.168.2.6185.208.158.248
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 3, 2024 08:40:01.849875927 CEST5374253192.168.2.6141.98.234.31
                                                                Oct 3, 2024 08:40:02.090013981 CEST5353742141.98.234.31192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Oct 3, 2024 08:40:01.849875927 CEST192.168.2.6141.98.234.310x733fStandard query (0)ebirbqi.uaA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Oct 3, 2024 08:40:02.090013981 CEST141.98.234.31192.168.2.60x733fNo error (0)ebirbqi.ua185.208.158.248A (IP address)IN (0x0001)false
                                                                • ebirbqi.ua
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.649719185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:02.864634037 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:03.557631016 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:03 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:03.674933910 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:03.909456968 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:03 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.649720185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:04.080270052 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:04.779196978 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:04 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:04.898948908 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:05.142782927 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:05 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.649721185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:05.271353960 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:05.951478958 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:05 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:06.062617064 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:06.298695087 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:06 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:06.405808926 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:06.641705990 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:06 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.649722185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:06.786078930 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:08.480254889 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:07 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:08.482898951 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:07 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:08.484797001 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:07 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:08.486469030 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:07 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.649723185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:08.598814011 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:09.298475981 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:09 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:09.405997038 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:09.645940065 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:09 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.649725185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:09.776340008 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:10.475730896 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:10 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.649726185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:10.598853111 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:11.291286945 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:11 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.649727185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:11.412262917 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:12.100610018 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:12 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                8192.168.2.649728185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:12.224473000 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:13.668549061 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:12 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:13.668603897 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:12 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:13.668791056 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:12 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:13.780925989 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:14.021795034 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:13 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                9192.168.2.649729185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:14.146637917 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:14.854753971 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:14 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                10192.168.2.649730185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:14.973823071 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:15.682823896 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:15 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                11192.168.2.649731185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:15.806411982 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:16.486926079 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:16 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:16.594657898 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:16.829636097 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:16 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:16.937657118 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:17.172575951 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:17 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                12192.168.2.649732185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:17.306821108 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:18.004415035 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:17 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                13192.168.2.649733185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:18.130326033 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:18.836652040 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:18 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                14192.168.2.649734185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:18.958450079 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:19.657707930 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:19 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:19.765295982 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:20.004149914 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:19 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                15192.168.2.649735185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:20.130224943 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:20.809381008 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:20 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:20.921127081 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:21.156325102 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:21 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:21.267410040 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:21.502697945 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:21 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                16192.168.2.649736185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:21.630506039 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:22.341828108 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:22 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:22.452673912 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:22.693164110 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:22 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                17192.168.2.649737185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:22.986327887 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:23.674521923 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:23 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                18192.168.2.649738185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:23.802931070 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:24.482613087 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:24 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:24.594302893 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:24.979993105 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:24 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                19192.168.2.649739185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:25.099147081 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:25.798125982 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:25 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                20192.168.2.649740185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:25.926884890 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:26.606780052 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:26 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:26.718776941 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:26.953551054 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:26 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:27.063043118 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:27.297996044 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:27 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:27.406148911 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:27.641269922 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:27 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                21192.168.2.649741185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:27.773305893 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:28.464914083 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:28 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                22192.168.2.649742185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:29.574685097 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:30.265495062 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:30 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                23192.168.2.649743185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:30.396600008 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:31.104674101 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:31 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                24192.168.2.649744185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:31.399708033 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:32.078743935 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:31 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:32.219335079 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:32.454421997 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:32 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:32.562935114 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:32.798055887 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:32 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:32.906284094 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:33.141210079 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:33 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:33.250504017 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:33.485387087 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:33 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:33.599545956 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:33.834593058 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:33 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:34.063133001 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:34.298094988 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:34 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:34.406945944 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:34.648475885 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:34 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                25192.168.2.649745185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:34.773619890 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:35.454287052 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:35 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:35.562244892 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:35.797399998 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:35 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:35.907480001 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:36.144242048 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:36 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                26192.168.2.649746185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:36.273219109 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:36.957178116 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:36 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                27192.168.2.649748185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:37.086796045 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:37.775580883 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:37 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                28192.168.2.649749185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:37.897097111 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:38.577610970 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:38 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:38.687458992 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:38.922528028 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:38 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                29192.168.2.649750185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:39.052006960 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:39.790052891 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:39 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                30192.168.2.649751185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:39.912134886 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:40.601171970 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:40 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                31192.168.2.649752185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:40.724133015 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:41.422849894 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:41 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:41.531342030 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:41.770196915 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:41 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                32192.168.2.649753185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:41.896423101 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:42.584836006 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:42 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                33192.168.2.649754185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:42.728334904 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:43.426830053 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:43 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                34192.168.2.649755185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:43.552997112 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:44.232821941 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:44 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:44.345263004 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:44.580113888 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:44 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:44.687431097 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:44.974201918 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:44 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                35192.168.2.649756185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:45.100343943 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:45.788096905 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:45 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                36192.168.2.649757185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:45.912000895 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:46.620382071 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:46 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                37192.168.2.649758185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:46.740458965 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:47.428903103 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:47 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                38192.168.2.649759185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:47.552508116 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:48.250814915 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:48 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:48.359740973 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:48.821665049 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:48 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:48.821926117 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:48 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                39192.168.2.649760185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:48.943679094 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:49.635982037 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:49 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                40192.168.2.649761185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:49.755646944 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:50.436171055 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:50 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:50.547101974 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:50.782444954 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:50 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:50.890703917 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:51.125736952 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:51 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:51.234190941 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:51.469795942 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:51 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                41192.168.2.649762185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:51.603843927 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:52.430360079 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:52 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                42192.168.2.649763185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:52.553674936 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:53.235363960 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:53 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:53.344419003 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:53.580605030 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:53 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:53.687880993 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:53.923546076 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:53 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:54.033719063 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:54.270473957 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:54 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                43192.168.2.649764185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:54.396403074 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:55.079179049 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:54 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                44192.168.2.649765185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:55.224386930 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:55.912945032 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:55 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                45192.168.2.649766185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:56.037364960 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:56.727710962 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:56 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                46192.168.2.649767185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:56.849489927 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:57.530292034 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:57 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                47192.168.2.649768185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:57.752083063 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:58.436193943 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:58 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:58.547574043 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:59.085712910 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:58 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:40:59.087635994 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:58 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                48192.168.2.649769185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:40:59.211988926 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:40:59.908010006 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:40:59 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:41:00.015861988 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:00.252676010 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:00 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                49192.168.2.649770185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:00.403549910 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:01.124316931 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:01 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                50192.168.2.649771185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:01.898866892 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:02.734208107 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:02 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                51192.168.2.649772185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:02.851217985 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:03.541661024 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:03 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                52192.168.2.649773185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:03.662544012 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:04.363653898 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:04 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                53192.168.2.649774185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:04.521970034 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:05.280806065 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:05 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                54192.168.2.649775185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:05.414280891 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:05.653719902 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:07.091998100 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:06 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                55192.168.2.649776185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:07.227294922 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:07.958908081 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:07 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                56192.168.2.649777185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:08.087143898 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:09.318182945 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:08 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Oct 3, 2024 08:41:09.319293976 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:08 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                57192.168.2.649778185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:09.451809883 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:10.152586937 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:10 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                58192.168.2.649780185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:10.276777983 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:10.994122982 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:10 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                59192.168.2.649781185.208.158.248806236C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 3, 2024 08:41:11.119076967 CEST313OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396087fc16c6ef9d HTTP/1.1
                                                                Host: ebirbqi.ua
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Oct 3, 2024 08:41:11.825767040 CEST220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Thu, 03 Oct 2024 06:41:11 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:02:39:05
                                                                Start date:03/10/2024
                                                                Path:C:\Users\user\Desktop\Xzm9fAfKhB.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\Xzm9fAfKhB.exe"
                                                                Imagebase:0x400000
                                                                File size:8'354'805 bytes
                                                                MD5 hash:D9CD9F798CB8012CE2834AC5E21ED371
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:1
                                                                Start time:02:39:05
                                                                Start date:03/10/2024
                                                                Path:C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-5LAS4.tmp\Xzm9fAfKhB.tmp" /SL5="$203DC,8066431,54272,C:\Users\user\Desktop\Xzm9fAfKhB.exe"
                                                                Imagebase:0x400000
                                                                File size:709'120 bytes
                                                                MD5 hash:16C9D19AB32C18671706CEFEE19B6949
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 4%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:3
                                                                Start time:02:39:08
                                                                Start date:03/10/2024
                                                                Path:C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe" -i
                                                                Imagebase:0x400000
                                                                File size:2'586'624 bytes
                                                                MD5 hash:96504F6C70AD91FDC3D32BF7C3FA2696
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3386241526.0000000002BB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:21%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:2.4%
                                                                  Total number of Nodes:1498
                                                                  Total number of Limit Nodes:22
                                                                  execution_graph 4985 409c40 5026 4030dc 4985->5026 4987 409c56 5029 4042e8 4987->5029 4989 409c5b 5032 40457c GetModuleHandleA GetProcAddress 4989->5032 4995 409c6a 5049 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4995->5049 5012 409d43 5111 4074a0 5012->5111 5014 409d05 5014->5012 5144 409aa0 5014->5144 5015 409d84 5115 407a28 5015->5115 5016 409d69 5016->5015 5017 409aa0 4 API calls 5016->5017 5017->5015 5019 409da9 5125 408b08 5019->5125 5023 409def 5024 408b08 21 API calls 5023->5024 5025 409e28 5023->5025 5024->5023 5154 403094 5026->5154 5028 4030e1 GetModuleHandleA GetCommandLineA 5028->4987 5031 404323 5029->5031 5155 403154 5029->5155 5031->4989 5033 404598 5032->5033 5034 40459f GetProcAddress 5032->5034 5033->5034 5035 4045b5 GetProcAddress 5034->5035 5036 4045ae 5034->5036 5037 4045c4 SetProcessDEPPolicy 5035->5037 5038 4045c8 5035->5038 5036->5035 5037->5038 5039 4065b8 5038->5039 5168 405c98 5039->5168 5048 406604 6F9C1CD0 5048->4995 5050 4090f7 5049->5050 5295 406fa0 SetErrorMode 5050->5295 5055 403198 4 API calls 5056 40913c 5055->5056 5057 409b30 GetSystemInfo VirtualQuery 5056->5057 5058 409be4 5057->5058 5061 409b5a 5057->5061 5063 409768 5058->5063 5059 409bc5 VirtualQuery 5059->5058 5059->5061 5060 409b84 VirtualProtect 5060->5061 5061->5058 5061->5059 5061->5060 5062 409bb3 VirtualProtect 5061->5062 5062->5059 5305 406bd0 GetCommandLineA 5063->5305 5065 409825 5067 4031b8 4 API calls 5065->5067 5066 406c2c 6 API calls 5070 409785 5066->5070 5068 40983f 5067->5068 5071 406c2c 5068->5071 5069 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5069->5070 5070->5065 5070->5066 5070->5069 5072 406c53 GetModuleFileNameA 5071->5072 5073 406c77 GetCommandLineA 5071->5073 5074 403278 4 API calls 5072->5074 5075 406c7c 5073->5075 5076 406c75 5074->5076 5077 406c81 5075->5077 5078 406af0 4 API calls 5075->5078 5081 406c89 5075->5081 5079 406ca4 5076->5079 5080 403198 4 API calls 5077->5080 5078->5075 5082 403198 4 API calls 5079->5082 5080->5081 5083 40322c 4 API calls 5081->5083 5084 406cb9 5082->5084 5083->5079 5085 4031e8 5084->5085 5086 4031ec 5085->5086 5089 4031fc 5085->5089 5088 403254 4 API calls 5086->5088 5086->5089 5087 403228 5091 4074e0 5087->5091 5088->5089 5089->5087 5090 4025ac 4 API calls 5089->5090 5090->5087 5092 4074ea 5091->5092 5326 407576 5092->5326 5329 407578 5092->5329 5093 407516 5095 40752a 5093->5095 5332 40748c GetLastError 5093->5332 5098 409bec FindResourceA 5095->5098 5099 409c01 5098->5099 5100 409c06 SizeofResource 5098->5100 5101 409aa0 4 API calls 5099->5101 5102 409c13 5100->5102 5103 409c18 LoadResource 5100->5103 5101->5100 5104 409aa0 4 API calls 5102->5104 5105 409c26 5103->5105 5106 409c2b LockResource 5103->5106 5104->5103 5107 409aa0 4 API calls 5105->5107 5108 409c37 5106->5108 5109 409c3c 5106->5109 5107->5106 5110 409aa0 4 API calls 5108->5110 5109->5014 5141 407918 5109->5141 5110->5109 5112 4074b4 5111->5112 5113 4074c4 5112->5113 5114 4073ec 20 API calls 5112->5114 5113->5016 5114->5113 5116 407a35 5115->5116 5117 405880 4 API calls 5116->5117 5118 407a89 5116->5118 5117->5118 5119 407918 InterlockedExchange 5118->5119 5120 407a9b 5119->5120 5121 405880 4 API calls 5120->5121 5122 407ab1 5120->5122 5121->5122 5123 405880 4 API calls 5122->5123 5124 407af4 5122->5124 5123->5124 5124->5019 5129 408b82 5125->5129 5133 408b39 5125->5133 5126 408bcd 5440 407cb8 5126->5440 5128 408be4 5132 4031b8 4 API calls 5128->5132 5129->5126 5131 4034f0 4 API calls 5129->5131 5137 4031e8 4 API calls 5129->5137 5138 403420 4 API calls 5129->5138 5140 407cb8 21 API calls 5129->5140 5131->5129 5135 408bfe 5132->5135 5133->5129 5134 4031e8 4 API calls 5133->5134 5136 403420 4 API calls 5133->5136 5139 407cb8 21 API calls 5133->5139 5431 4034f0 5133->5431 5134->5133 5151 404c10 5135->5151 5136->5133 5137->5129 5138->5129 5139->5133 5140->5129 5466 4078c4 5141->5466 5145 409ac1 5144->5145 5146 409aa9 5144->5146 5147 405880 4 API calls 5145->5147 5148 405880 4 API calls 5146->5148 5150 409ad2 5147->5150 5149 409abb 5148->5149 5149->5012 5150->5012 5152 402594 4 API calls 5151->5152 5153 404c1b 5152->5153 5153->5023 5154->5028 5156 403164 5155->5156 5157 40318c TlsGetValue 5155->5157 5156->5031 5158 403196 5157->5158 5159 40316f 5157->5159 5158->5031 5163 40310c 5159->5163 5161 403174 TlsGetValue 5162 403184 5161->5162 5162->5031 5164 403120 LocalAlloc 5163->5164 5165 403116 5163->5165 5166 40313e TlsSetValue 5164->5166 5167 403132 5164->5167 5165->5164 5166->5167 5167->5161 5240 405930 5168->5240 5171 405270 GetSystemDefaultLCID 5175 4052a6 5171->5175 5172 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5172->5175 5173 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5173->5175 5174 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5174->5175 5175->5172 5175->5173 5175->5174 5179 405308 5175->5179 5176 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5176->5179 5177 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5177->5179 5178 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5178->5179 5179->5176 5179->5177 5179->5178 5180 40538b 5179->5180 5273 4031b8 5180->5273 5183 4053b4 GetSystemDefaultLCID 5277 4051fc GetLocaleInfoA 5183->5277 5186 4031e8 4 API calls 5187 4053f4 5186->5187 5188 4051fc 5 API calls 5187->5188 5189 405409 5188->5189 5190 4051fc 5 API calls 5189->5190 5191 40542d 5190->5191 5283 405248 GetLocaleInfoA 5191->5283 5194 405248 GetLocaleInfoA 5195 40545d 5194->5195 5196 4051fc 5 API calls 5195->5196 5197 405477 5196->5197 5198 405248 GetLocaleInfoA 5197->5198 5199 405494 5198->5199 5200 4051fc 5 API calls 5199->5200 5201 4054ae 5200->5201 5202 4031e8 4 API calls 5201->5202 5203 4054bb 5202->5203 5204 4051fc 5 API calls 5203->5204 5205 4054d0 5204->5205 5206 4031e8 4 API calls 5205->5206 5207 4054dd 5206->5207 5208 405248 GetLocaleInfoA 5207->5208 5209 4054eb 5208->5209 5210 4051fc 5 API calls 5209->5210 5211 405505 5210->5211 5212 4031e8 4 API calls 5211->5212 5213 405512 5212->5213 5214 4051fc 5 API calls 5213->5214 5215 405527 5214->5215 5216 4031e8 4 API calls 5215->5216 5217 405534 5216->5217 5218 4051fc 5 API calls 5217->5218 5219 405549 5218->5219 5220 405566 5219->5220 5221 405557 5219->5221 5223 40322c 4 API calls 5220->5223 5291 40322c 5221->5291 5224 405564 5223->5224 5225 4051fc 5 API calls 5224->5225 5226 405588 5225->5226 5227 4055a5 5226->5227 5228 405596 5226->5228 5230 403198 4 API calls 5227->5230 5229 40322c 4 API calls 5228->5229 5231 4055a3 5229->5231 5230->5231 5285 4033b4 5231->5285 5233 4055c7 5234 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5233->5234 5235 4055e1 5234->5235 5236 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5235->5236 5237 4055fb 5236->5237 5238 405ce4 GetVersionExA 5237->5238 5239 405cfb 5238->5239 5239->5048 5241 40593c 5240->5241 5248 404ccc LoadStringA 5241->5248 5244 4031e8 4 API calls 5245 40596d 5244->5245 5251 403198 5245->5251 5255 403278 5248->5255 5252 4031b7 5251->5252 5253 40319e 5251->5253 5252->5171 5253->5252 5269 4025ac 5253->5269 5260 403254 5255->5260 5257 403288 5258 403198 4 API calls 5257->5258 5259 4032a0 5258->5259 5259->5244 5261 403274 5260->5261 5262 403258 5260->5262 5261->5257 5265 402594 5262->5265 5264 403261 5264->5257 5266 402598 5265->5266 5267 4025a2 5265->5267 5266->5267 5268 403154 4 API calls 5266->5268 5267->5264 5267->5267 5268->5267 5270 4025b0 5269->5270 5271 4025ba 5269->5271 5270->5271 5272 403154 4 API calls 5270->5272 5271->5252 5271->5271 5272->5271 5274 4031be 5273->5274 5275 4031e3 5274->5275 5276 4025ac 4 API calls 5274->5276 5275->5183 5276->5274 5278 405223 5277->5278 5279 405235 5277->5279 5281 403278 4 API calls 5278->5281 5280 40322c 4 API calls 5279->5280 5282 405233 5280->5282 5281->5282 5282->5186 5284 405264 5283->5284 5284->5194 5286 4033bc 5285->5286 5287 403254 4 API calls 5286->5287 5288 4033cf 5287->5288 5289 4031e8 4 API calls 5288->5289 5290 4033f7 5289->5290 5293 403230 5291->5293 5292 403252 5292->5224 5293->5292 5294 4025ac 4 API calls 5293->5294 5294->5292 5303 403414 5295->5303 5298 406fee 5299 407284 FormatMessageA 5298->5299 5300 4072aa 5299->5300 5301 403278 4 API calls 5300->5301 5302 4072c7 5301->5302 5302->5055 5304 403418 LoadLibraryA 5303->5304 5304->5298 5312 406af0 5305->5312 5307 406bf3 5308 406c05 5307->5308 5309 406af0 4 API calls 5307->5309 5310 403198 4 API calls 5308->5310 5309->5307 5311 406c1a 5310->5311 5311->5070 5313 406b1c 5312->5313 5314 403278 4 API calls 5313->5314 5315 406b29 5314->5315 5322 403420 5315->5322 5317 406b31 5318 4031e8 4 API calls 5317->5318 5319 406b49 5318->5319 5320 403198 4 API calls 5319->5320 5321 406b6b 5320->5321 5321->5307 5323 403426 5322->5323 5325 403437 5322->5325 5324 403254 4 API calls 5323->5324 5323->5325 5324->5325 5325->5317 5327 407578 5326->5327 5328 4075b7 CreateFileA 5327->5328 5328->5093 5330 403414 5329->5330 5331 4075b7 CreateFileA 5330->5331 5331->5093 5335 4073ec 5332->5335 5336 407284 5 API calls 5335->5336 5337 407414 5336->5337 5338 407434 5337->5338 5344 405184 5337->5344 5347 405880 5338->5347 5341 407443 5342 403198 4 API calls 5341->5342 5343 407460 5342->5343 5343->5095 5351 405198 5344->5351 5348 405887 5347->5348 5349 4031e8 4 API calls 5348->5349 5350 40589f 5349->5350 5350->5341 5352 4051b5 5351->5352 5359 404e48 5352->5359 5355 4051e1 5357 403278 4 API calls 5355->5357 5358 405193 5357->5358 5358->5338 5362 404e63 5359->5362 5360 404e75 5360->5355 5364 404bd4 5360->5364 5362->5360 5367 404f6a 5362->5367 5374 404e3c 5362->5374 5365 405930 5 API calls 5364->5365 5366 404be5 5365->5366 5366->5355 5368 404f7b 5367->5368 5371 404fc9 5367->5371 5370 40504f 5368->5370 5368->5371 5373 404fe7 5370->5373 5381 404e28 5370->5381 5371->5373 5377 404de4 5371->5377 5373->5362 5375 403198 4 API calls 5374->5375 5376 404e46 5375->5376 5376->5362 5378 404df2 5377->5378 5384 404bec 5378->5384 5380 404e20 5380->5371 5397 4039a4 5381->5397 5387 4059a0 5384->5387 5386 404c05 5386->5380 5388 4059ae 5387->5388 5389 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5388->5389 5390 4059d8 5389->5390 5391 405184 19 API calls 5390->5391 5392 4059e6 5391->5392 5393 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5392->5393 5394 4059f1 5393->5394 5395 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5394->5395 5396 405a0b 5395->5396 5396->5386 5398 4039ab 5397->5398 5403 4038b4 5398->5403 5400 4039cb 5401 403198 4 API calls 5400->5401 5402 4039d2 5401->5402 5402->5373 5404 4038d5 5403->5404 5405 4038c8 5403->5405 5407 403934 5404->5407 5408 4038db 5404->5408 5406 403780 6 API calls 5405->5406 5411 4038d0 5406->5411 5409 403993 5407->5409 5410 40393b 5407->5410 5412 4038e1 5408->5412 5413 4038ee 5408->5413 5415 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5409->5415 5416 403941 5410->5416 5417 40394b 5410->5417 5411->5400 5418 403894 6 API calls 5412->5418 5414 403894 6 API calls 5413->5414 5419 4038fc 5414->5419 5415->5411 5420 403864 9 API calls 5416->5420 5421 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5417->5421 5418->5411 5422 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5419->5422 5420->5411 5423 40395d 5421->5423 5424 403917 5422->5424 5425 403864 9 API calls 5423->5425 5427 40374c VariantClear 5424->5427 5426 403976 5425->5426 5428 40374c VariantClear 5426->5428 5429 40392c 5427->5429 5430 40398b 5428->5430 5429->5400 5430->5400 5432 4034fd 5431->5432 5438 40352d 5431->5438 5434 403526 5432->5434 5435 403509 5432->5435 5433 403198 4 API calls 5439 403517 5433->5439 5436 403254 4 API calls 5434->5436 5446 4025c4 5435->5446 5436->5438 5438->5433 5439->5133 5441 407cd3 5440->5441 5442 407cc8 5440->5442 5450 407c5c 5441->5450 5442->5128 5445 405880 4 API calls 5445->5442 5447 4025ca 5446->5447 5448 4025dc 5447->5448 5449 403154 4 API calls 5447->5449 5448->5439 5448->5448 5449->5448 5451 407c70 5450->5451 5452 407caf 5450->5452 5451->5452 5454 407bac 5451->5454 5452->5442 5452->5445 5455 407bb7 5454->5455 5456 407bc8 5454->5456 5458 405880 4 API calls 5455->5458 5457 4074a0 20 API calls 5456->5457 5459 407bdc 5457->5459 5458->5456 5460 4074a0 20 API calls 5459->5460 5461 407bfd 5460->5461 5462 407918 InterlockedExchange 5461->5462 5463 407c12 5462->5463 5464 407c28 5463->5464 5465 405880 4 API calls 5463->5465 5464->5451 5465->5464 5467 4078d6 5466->5467 5468 4078e7 5466->5468 5469 4078db InterlockedExchange 5467->5469 5468->5014 5469->5468 6242 409e47 6243 409e6c 6242->6243 6244 4098f4 15 API calls 6243->6244 6247 409e71 6244->6247 6245 409ec4 6276 4026c4 GetSystemTime 6245->6276 6247->6245 6250 408dd8 4 API calls 6247->6250 6248 409ec9 6249 409330 32 API calls 6248->6249 6251 409ed1 6249->6251 6252 409ea0 6250->6252 6253 4031e8 4 API calls 6251->6253 6256 409ea8 MessageBoxA 6252->6256 6254 409ede 6253->6254 6255 406928 5 API calls 6254->6255 6257 409eeb 6255->6257 6256->6245 6258 409eb5 6256->6258 6259 4066c0 5 API calls 6257->6259 6260 405854 5 API calls 6258->6260 6261 409efb 6259->6261 6260->6245 6262 406638 5 API calls 6261->6262 6263 409f0c 6262->6263 6264 403340 4 API calls 6263->6264 6265 409f1a 6264->6265 6266 4031e8 4 API calls 6265->6266 6267 409f2a 6266->6267 6268 4074e0 23 API calls 6267->6268 6269 409f69 6268->6269 6270 402594 4 API calls 6269->6270 6271 409f89 6270->6271 6272 407a28 5 API calls 6271->6272 6273 409fcb 6272->6273 6274 407cb8 21 API calls 6273->6274 6275 409ff2 6274->6275 6276->6248 6203 407548 6204 407554 CloseHandle 6203->6204 6205 40755d 6203->6205 6204->6205 6655 402b48 RaiseException 6206 407749 6207 4076dc WriteFile 6206->6207 6213 407724 6206->6213 6208 4076e8 6207->6208 6209 4076ef 6207->6209 6210 40748c 21 API calls 6208->6210 6211 407700 6209->6211 6212 4073ec 20 API calls 6209->6212 6210->6209 6212->6211 6213->6206 6214 4077e0 6213->6214 6215 4078db InterlockedExchange 6214->6215 6217 407890 6214->6217 6216 4078e7 6215->6216 6656 40294a 6657 402952 6656->6657 6658 403554 4 API calls 6657->6658 6659 402967 6657->6659 6658->6657 6660 403f4a 6661 403f53 6660->6661 6663 403f5c 6660->6663 6664 403f07 6661->6664 6667 403f09 6664->6667 6666 403f3c 6666->6663 6668 403154 4 API calls 6667->6668 6670 403e9c 6667->6670 6673 403f3d 6667->6673 6687 403e9c 6667->6687 6668->6667 6669 403ef2 6672 402674 4 API calls 6669->6672 6670->6666 6670->6669 6676 403ea9 6670->6676 6678 403e8e 6670->6678 6675 403ecf 6672->6675 6673->6663 6675->6663 6676->6675 6677 402674 4 API calls 6676->6677 6677->6675 6679 403e4c 6678->6679 6680 403e62 6679->6680 6681 403e7b 6679->6681 6684 403e67 6679->6684 6682 403cc8 4 API calls 6680->6682 6683 402674 4 API calls 6681->6683 6682->6684 6685 403e78 6683->6685 6684->6685 6686 402674 4 API calls 6684->6686 6685->6669 6685->6676 6686->6685 6688 403ed7 6687->6688 6694 403ea9 6687->6694 6689 403ef2 6688->6689 6691 403e8e 4 API calls 6688->6691 6692 402674 4 API calls 6689->6692 6690 403ecf 6690->6667 6693 403ee6 6691->6693 6692->6690 6693->6689 6693->6694 6694->6690 6695 402674 4 API calls 6694->6695 6695->6690 6704 405150 6705 405163 6704->6705 6706 404e48 19 API calls 6705->6706 6707 405177 6706->6707 6277 403a52 6278 403a5a WriteFile 6277->6278 6280 403a74 6277->6280 6279 403a78 GetLastError 6278->6279 6278->6280 6279->6280 6281 402654 6282 403154 4 API calls 6281->6282 6283 402614 6282->6283 6284 402632 6283->6284 6285 403154 4 API calls 6283->6285 6285->6284 5652 409e62 5653 409aa0 4 API calls 5652->5653 5654 409e67 5653->5654 5655 409e6c 5654->5655 5755 402f24 5654->5755 5689 4098f4 5655->5689 5658 409ec4 5694 4026c4 GetSystemTime 5658->5694 5660 409e71 5660->5658 5760 408dd8 5660->5760 5661 409ec9 5695 409330 5661->5695 5665 409ea0 5669 409ea8 MessageBoxA 5665->5669 5666 4031e8 4 API calls 5667 409ede 5666->5667 5713 406928 5667->5713 5669->5658 5671 409eb5 5669->5671 5763 405854 5671->5763 5676 409f0c 5740 403340 5676->5740 5678 409f1a 5679 4031e8 4 API calls 5678->5679 5680 409f2a 5679->5680 5681 4074e0 23 API calls 5680->5681 5682 409f69 5681->5682 5683 402594 4 API calls 5682->5683 5684 409f89 5683->5684 5685 407a28 5 API calls 5684->5685 5686 409fcb 5685->5686 5687 407cb8 21 API calls 5686->5687 5688 409ff2 5687->5688 5767 40953c 5689->5767 5694->5661 5698 409350 5695->5698 5699 409375 CreateDirectoryA 5698->5699 5703 408dd8 4 API calls 5698->5703 5708 407284 5 API calls 5698->5708 5712 405880 4 API calls 5698->5712 5859 406cf4 5698->5859 5882 409224 5698->5882 5901 404c84 5698->5901 5904 408da8 5698->5904 5700 4093ed 5699->5700 5701 40937f GetLastError 5699->5701 5702 40322c 4 API calls 5700->5702 5701->5698 5704 4093f7 5702->5704 5703->5698 5706 4031b8 4 API calls 5704->5706 5707 409411 5706->5707 5709 4031b8 4 API calls 5707->5709 5708->5698 5710 40941e 5709->5710 5710->5666 5712->5698 6014 406820 5713->6014 5716 403454 4 API calls 5717 40694a 5716->5717 5718 4066c0 5717->5718 6019 4068e4 5718->6019 5721 4066f0 5723 403340 4 API calls 5721->5723 5722 4066fe 5724 403454 4 API calls 5722->5724 5727 4066fc 5723->5727 5725 406711 5724->5725 5726 403340 4 API calls 5725->5726 5726->5727 5728 403198 4 API calls 5727->5728 5729 406733 5728->5729 5730 406638 5729->5730 5731 406642 5730->5731 5732 406665 5730->5732 6025 406950 5731->6025 5733 40322c 4 API calls 5732->5733 5735 40666e 5733->5735 5735->5676 5736 406649 5736->5732 5737 406654 5736->5737 5738 403340 4 API calls 5737->5738 5739 406662 5738->5739 5739->5676 5741 403344 5740->5741 5742 4033a5 5740->5742 5743 4031e8 5741->5743 5744 40334c 5741->5744 5745 4031fc 5743->5745 5748 403254 4 API calls 5743->5748 5744->5742 5749 4031e8 4 API calls 5744->5749 5750 40335b 5744->5750 5746 403228 5745->5746 5751 4025ac 4 API calls 5745->5751 5746->5678 5747 403254 4 API calls 5752 403375 5747->5752 5748->5745 5749->5750 5750->5747 5751->5746 5753 4031e8 4 API calls 5752->5753 5754 4033a1 5753->5754 5754->5678 5756 403154 4 API calls 5755->5756 5757 402f29 5756->5757 6031 402bcc 5757->6031 5759 402f51 5759->5759 5761 408da8 4 API calls 5760->5761 5762 408df4 5761->5762 5762->5665 5764 405859 5763->5764 5765 405930 5 API calls 5764->5765 5766 40586b 5765->5766 5766->5766 5774 40955b 5767->5774 5768 409590 5770 40959d GetUserDefaultLangID 5768->5770 5775 409592 5768->5775 5769 409594 5785 407024 GetModuleHandleA GetProcAddress 5769->5785 5770->5775 5773 40956f 5779 409884 5773->5779 5774->5768 5774->5769 5774->5773 5775->5773 5776 4095cb GetACP 5775->5776 5777 4095ef 5775->5777 5776->5773 5776->5775 5777->5773 5778 409615 GetACP 5777->5778 5778->5773 5778->5777 5780 40988c 5779->5780 5784 4098c6 5779->5784 5781 403420 4 API calls 5780->5781 5780->5784 5782 4098c0 5781->5782 5843 408e80 5782->5843 5784->5660 5786 407067 5785->5786 5787 40705e 5785->5787 5788 407070 5786->5788 5789 4070a8 5786->5789 5798 403198 4 API calls 5787->5798 5806 406f68 5788->5806 5791 406f68 RegOpenKeyExA 5789->5791 5793 4070c1 5791->5793 5792 407089 5794 4070de 5792->5794 5809 406f5c 5792->5809 5793->5794 5795 406f5c 6 API calls 5793->5795 5796 40322c 4 API calls 5794->5796 5799 4070d5 RegCloseKey 5795->5799 5800 4070eb 5796->5800 5802 407120 5798->5802 5799->5794 5812 4032fc 5800->5812 5804 403198 4 API calls 5802->5804 5805 407128 5804->5805 5805->5775 5807 406f73 5806->5807 5808 406f79 RegOpenKeyExA 5806->5808 5807->5808 5808->5792 5826 406e10 5809->5826 5813 403300 5812->5813 5814 40333f 5812->5814 5815 4031e8 5813->5815 5816 40330a 5813->5816 5814->5787 5822 403254 4 API calls 5815->5822 5823 4031fc 5815->5823 5817 403334 5816->5817 5818 40331d 5816->5818 5819 4034f0 4 API calls 5817->5819 5820 4034f0 4 API calls 5818->5820 5825 403322 5819->5825 5820->5825 5821 403228 5821->5787 5822->5823 5823->5821 5824 4025ac 4 API calls 5823->5824 5824->5821 5825->5787 5827 406e36 RegQueryValueExA 5826->5827 5828 406e7b 5827->5828 5833 406e59 5827->5833 5830 403198 4 API calls 5828->5830 5829 406e73 5831 403198 4 API calls 5829->5831 5832 406f47 RegCloseKey 5830->5832 5831->5828 5832->5794 5833->5828 5833->5829 5834 403278 4 API calls 5833->5834 5835 403420 4 API calls 5833->5835 5834->5833 5836 406eb0 RegQueryValueExA 5835->5836 5836->5827 5838 406ecc 5836->5838 5837 4034f0 4 API calls 5839 406f0e 5837->5839 5838->5828 5838->5837 5840 406f20 5839->5840 5842 403420 4 API calls 5839->5842 5841 4031e8 4 API calls 5840->5841 5841->5828 5842->5840 5844 408e8e 5843->5844 5846 408ea6 5844->5846 5856 408e18 5844->5856 5847 408e18 4 API calls 5846->5847 5848 408eca 5846->5848 5847->5848 5849 407918 InterlockedExchange 5848->5849 5850 408ee5 5849->5850 5851 408e18 4 API calls 5850->5851 5853 408ef8 5850->5853 5851->5853 5852 408e18 4 API calls 5852->5853 5853->5852 5854 403278 4 API calls 5853->5854 5855 408f27 5853->5855 5854->5853 5855->5784 5857 405880 4 API calls 5856->5857 5858 408e29 5857->5858 5858->5846 5908 406a58 5859->5908 5862 406d26 5864 406a58 5 API calls 5862->5864 5866 406d72 5862->5866 5865 406d36 5864->5865 5868 406a34 7 API calls 5865->5868 5872 406d42 5865->5872 5916 406888 5866->5916 5868->5872 5869 406a58 5 API calls 5873 406d5b 5869->5873 5872->5866 5872->5869 5878 406d67 5872->5878 5876 406a34 7 API calls 5873->5876 5873->5878 5874 406638 5 API calls 5875 406d87 5874->5875 5877 40322c 4 API calls 5875->5877 5876->5878 5879 406d91 5877->5879 5878->5866 5928 406cc8 GetWindowsDirectoryA 5878->5928 5880 4031b8 4 API calls 5879->5880 5881 406dab 5880->5881 5881->5698 5883 409244 5882->5883 5884 406638 5 API calls 5883->5884 5885 40925d 5884->5885 5886 40322c 4 API calls 5885->5886 5893 409268 5886->5893 5887 406978 6 API calls 5887->5893 5889 408dd8 4 API calls 5889->5893 5890 4033b4 4 API calls 5890->5893 5891 405880 4 API calls 5891->5893 5893->5887 5893->5889 5893->5890 5893->5891 5894 4092e4 5893->5894 5968 4091b0 5893->5968 5976 409034 5893->5976 5895 40322c 4 API calls 5894->5895 5896 4092ef 5895->5896 5897 4031b8 4 API calls 5896->5897 5898 409309 5897->5898 5899 403198 4 API calls 5898->5899 5900 409311 5899->5900 5900->5698 5902 405198 19 API calls 5901->5902 5903 404ca2 5902->5903 5903->5698 5905 408dc8 5904->5905 6004 408c80 5905->6004 5909 4034f0 4 API calls 5908->5909 5911 406a6b 5909->5911 5910 406a82 GetEnvironmentVariableA 5910->5911 5912 406a8e 5910->5912 5911->5910 5915 406a95 5911->5915 5930 406dec 5911->5930 5913 403198 4 API calls 5912->5913 5913->5915 5915->5862 5925 406a34 5915->5925 5917 403414 5916->5917 5918 4068ab GetFullPathNameA 5917->5918 5919 4068b7 5918->5919 5920 4068ce 5918->5920 5919->5920 5921 4068bf 5919->5921 5922 40322c 4 API calls 5920->5922 5923 403278 4 API calls 5921->5923 5924 4068cc 5922->5924 5923->5924 5924->5874 5934 4069dc 5925->5934 5929 406ce9 5928->5929 5929->5866 5931 406dfa 5930->5931 5932 4034f0 4 API calls 5931->5932 5933 406e08 5932->5933 5933->5911 5941 406978 5934->5941 5936 4069fe 5937 406a06 GetFileAttributesA 5936->5937 5938 406a1b 5937->5938 5939 403198 4 API calls 5938->5939 5940 406a23 5939->5940 5940->5862 5951 406744 5941->5951 5943 4069b0 5946 4069c6 5943->5946 5947 4069bb 5943->5947 5945 406989 5945->5943 5958 406970 CharPrevA 5945->5958 5959 403454 5946->5959 5948 40322c 4 API calls 5947->5948 5950 4069c4 5948->5950 5950->5936 5954 406755 5951->5954 5952 4067b9 5953 406680 IsDBCSLeadByte 5952->5953 5955 4067b4 5952->5955 5953->5955 5954->5952 5956 406773 5954->5956 5955->5945 5956->5955 5966 406680 IsDBCSLeadByte 5956->5966 5958->5945 5960 403486 5959->5960 5961 403459 5959->5961 5962 403198 4 API calls 5960->5962 5961->5960 5964 40346d 5961->5964 5963 40347c 5962->5963 5963->5950 5965 403278 4 API calls 5964->5965 5965->5963 5967 406694 5966->5967 5967->5956 5969 403198 4 API calls 5968->5969 5971 4091d1 5969->5971 5973 4091fe 5971->5973 5985 4032a8 5971->5985 5988 403494 5971->5988 5974 403198 4 API calls 5973->5974 5975 409213 5974->5975 5975->5893 5992 408f70 5976->5992 5978 40904a 5979 40904e 5978->5979 5998 406a48 5978->5998 5979->5893 5982 409081 6001 408fac 5982->6001 5986 403278 4 API calls 5985->5986 5987 4032b5 5986->5987 5987->5971 5989 4034c3 5988->5989 5990 403498 5988->5990 5989->5971 5991 4034f0 4 API calls 5990->5991 5991->5989 5993 408f7a 5992->5993 5994 408f7e 5992->5994 5993->5978 5995 408fa0 SetLastError 5994->5995 5996 408f87 Wow64DisableWow64FsRedirection 5994->5996 5997 408f9b 5995->5997 5996->5997 5997->5978 5999 4069dc 7 API calls 5998->5999 6000 406a52 GetLastError 5999->6000 6000->5982 6002 408fb1 Wow64RevertWow64FsRedirection 6001->6002 6003 408fbb 6001->6003 6002->6003 6003->5893 6005 403198 4 API calls 6004->6005 6007 408cb1 6004->6007 6005->6007 6006 408cdc 6008 4031b8 4 API calls 6006->6008 6007->6006 6009 408cc8 6007->6009 6011 403278 4 API calls 6007->6011 6013 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6007->6013 6010 408d69 6008->6010 6012 4032fc 4 API calls 6009->6012 6010->5698 6011->6007 6012->6006 6013->6007 6015 406744 IsDBCSLeadByte 6014->6015 6017 406835 6015->6017 6016 40687f 6016->5716 6017->6016 6018 406680 IsDBCSLeadByte 6017->6018 6018->6017 6020 4068f3 6019->6020 6021 406820 IsDBCSLeadByte 6020->6021 6024 4068fe 6021->6024 6022 4066ea 6022->5721 6022->5722 6023 406680 IsDBCSLeadByte 6023->6024 6024->6022 6024->6023 6026 406957 6025->6026 6027 40695b 6025->6027 6026->5736 6030 406970 CharPrevA 6027->6030 6029 40696c 6029->5736 6030->6029 6032 402bd5 RaiseException 6031->6032 6033 402be6 6031->6033 6032->6033 6033->5759 6286 402e64 6287 402e69 6286->6287 6288 402e7a RtlUnwind 6287->6288 6289 402e5e 6287->6289 6290 402e9d 6288->6290 6307 40667c IsDBCSLeadByte 6308 406694 6307->6308 6720 403f7d 6721 403fa2 6720->6721 6724 403f84 6720->6724 6723 403e8e 4 API calls 6721->6723 6721->6724 6722 403f8c 6723->6724 6724->6722 6725 402674 4 API calls 6724->6725 6726 403fca 6725->6726 6733 403d02 6739 403d12 6733->6739 6734 403ddf ExitProcess 6735 403db8 6737 403cc8 4 API calls 6735->6737 6736 403dea 6738 403dc2 6737->6738 6740 403cc8 4 API calls 6738->6740 6739->6734 6739->6735 6739->6736 6739->6739 6742 403da4 6739->6742 6743 403d8f MessageBoxA 6739->6743 6741 403dcc 6740->6741 6753 4019dc 6741->6753 6749 403fe4 6742->6749 6743->6735 6746 403dd1 6746->6734 6746->6736 6750 403fe8 6749->6750 6751 403f07 4 API calls 6750->6751 6752 404006 6751->6752 6754 401abb 6753->6754 6755 4019ed 6753->6755 6754->6746 6756 401a04 RtlEnterCriticalSection 6755->6756 6757 401a0e LocalFree 6755->6757 6756->6757 6758 401a41 6757->6758 6759 401a2f VirtualFree 6758->6759 6760 401a49 6758->6760 6759->6758 6761 401a70 LocalFree 6760->6761 6762 401a87 6760->6762 6761->6761 6761->6762 6763 401aa9 RtlDeleteCriticalSection 6762->6763 6764 401a9f RtlLeaveCriticalSection 6762->6764 6763->6746 6764->6763 6317 404206 6318 4041cc 6317->6318 6321 40420a 6317->6321 6319 404282 6320 403154 4 API calls 6322 404323 6320->6322 6321->6319 6321->6320 6323 402c08 6326 402c82 6323->6326 6327 402c19 6323->6327 6324 402c56 RtlUnwind 6325 403154 4 API calls 6324->6325 6325->6326 6327->6324 6327->6326 6330 402b28 6327->6330 6331 402b31 RaiseException 6330->6331 6332 402b47 6330->6332 6331->6332 6332->6324 6333 408c10 6334 408c17 6333->6334 6335 403198 4 API calls 6334->6335 6343 408cb1 6335->6343 6336 408cdc 6337 4031b8 4 API calls 6336->6337 6339 408d69 6337->6339 6338 408cc8 6341 4032fc 4 API calls 6338->6341 6340 403278 4 API calls 6340->6343 6341->6336 6342 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6342->6343 6343->6336 6343->6338 6343->6340 6343->6342 6344 40a011 6345 40a036 6344->6345 6346 407918 InterlockedExchange 6345->6346 6348 40a060 6346->6348 6347 40a070 6354 4076ac SetEndOfFile 6347->6354 6348->6347 6349 409aa0 4 API calls 6348->6349 6349->6347 6351 40a08c 6352 4025ac 4 API calls 6351->6352 6353 40a0c3 6352->6353 6355 4076c3 6354->6355 6356 4076bc 6354->6356 6355->6351 6357 40748c 21 API calls 6356->6357 6357->6355 6769 409916 6770 409918 6769->6770 6771 40993a 6770->6771 6772 409956 CallWindowProcA 6770->6772 6772->6771 6085 407017 6086 407008 SetErrorMode 6085->6086 6362 403018 6363 403070 6362->6363 6364 403025 6362->6364 6365 40302a RtlUnwind 6364->6365 6366 40304e 6365->6366 6368 402f78 6366->6368 6369 402be8 6366->6369 6370 402bf1 RaiseException 6369->6370 6371 402c04 6369->6371 6370->6371 6371->6363 6779 409918 6780 40993a 6779->6780 6782 409927 6779->6782 6781 409956 CallWindowProcA 6781->6780 6782->6780 6782->6781 6376 40901e 6377 409010 6376->6377 6378 408fac Wow64RevertWow64FsRedirection 6377->6378 6379 409018 6378->6379 6380 409020 SetLastError 6381 409029 6380->6381 6392 403a28 ReadFile 6393 403a46 6392->6393 6394 403a49 GetLastError 6392->6394 6223 40762c ReadFile 6224 407663 6223->6224 6225 40764c 6223->6225 6226 407652 GetLastError 6225->6226 6227 40765c 6225->6227 6226->6224 6226->6227 6228 40748c 21 API calls 6227->6228 6228->6224 6399 40a02c 6400 409aa0 4 API calls 6399->6400 6401 40a031 6400->6401 6402 40a036 6401->6402 6403 402f24 5 API calls 6401->6403 6404 407918 InterlockedExchange 6402->6404 6403->6402 6405 40a060 6404->6405 6406 40a070 6405->6406 6407 409aa0 4 API calls 6405->6407 6408 4076ac 22 API calls 6406->6408 6407->6406 6409 40a08c 6408->6409 6410 4025ac 4 API calls 6409->6410 6411 40a0c3 6410->6411 6783 40712e 6784 407118 6783->6784 6785 403198 4 API calls 6784->6785 6786 407120 6785->6786 6787 403198 4 API calls 6786->6787 6788 407128 6787->6788 6789 408f30 6792 408dfc 6789->6792 6793 408e05 6792->6793 6794 403198 4 API calls 6793->6794 6795 408e13 6793->6795 6794->6793 6796 403932 6797 403924 6796->6797 6800 40374c 6797->6800 6799 40392c 6801 403766 6800->6801 6802 403759 6800->6802 6801->6799 6802->6801 6803 403779 VariantClear 6802->6803 6803->6799 6034 4075c4 SetFilePointer 6035 4075f7 6034->6035 6036 4075e7 GetLastError 6034->6036 6036->6035 6037 4075f0 6036->6037 6038 40748c 21 API calls 6037->6038 6038->6035 6412 405ac4 6413 405ad4 6412->6413 6414 405acc 6412->6414 6415 405ad2 6414->6415 6416 405adb 6414->6416 6419 405a3c 6415->6419 6417 405930 5 API calls 6416->6417 6417->6413 6420 405a44 6419->6420 6421 405a5e 6420->6421 6422 403154 4 API calls 6420->6422 6423 405a63 6421->6423 6424 405a7a 6421->6424 6422->6420 6425 405930 5 API calls 6423->6425 6426 403154 4 API calls 6424->6426 6427 405a76 6425->6427 6428 405a7f 6426->6428 6430 403154 4 API calls 6427->6430 6429 4059a0 19 API calls 6428->6429 6429->6427 6431 405aa8 6430->6431 6432 403154 4 API calls 6431->6432 6433 405ab6 6432->6433 6433->6413 6434 4076c8 WriteFile 6435 4076e8 6434->6435 6438 4076ef 6434->6438 6436 40748c 21 API calls 6435->6436 6436->6438 6437 407700 6438->6437 6439 4073ec 20 API calls 6438->6439 6439->6437 6440 40a2ca 6449 4096fc 6440->6449 6443 402f24 5 API calls 6444 40a2d4 6443->6444 6445 403198 4 API calls 6444->6445 6446 40a2f3 6445->6446 6447 403198 4 API calls 6446->6447 6448 40a2fb 6447->6448 6458 40569c 6449->6458 6451 409745 6454 403198 4 API calls 6451->6454 6452 409717 6452->6451 6464 40720c 6452->6464 6456 40975a 6454->6456 6455 409735 6457 40973d MessageBoxA 6455->6457 6456->6443 6457->6451 6459 403154 4 API calls 6458->6459 6460 4056a1 6459->6460 6461 4056b9 6460->6461 6462 403154 4 API calls 6460->6462 6461->6452 6463 4056af 6462->6463 6463->6452 6465 40569c 4 API calls 6464->6465 6466 40721b 6465->6466 6467 407221 6466->6467 6469 40722f 6466->6469 6468 40322c 4 API calls 6467->6468 6470 40722d 6468->6470 6471 40724b 6469->6471 6472 40723f 6469->6472 6470->6455 6482 4032b8 6471->6482 6475 4071d0 6472->6475 6476 40322c 4 API calls 6475->6476 6477 4071df 6476->6477 6478 4071fc 6477->6478 6479 406950 CharPrevA 6477->6479 6478->6470 6480 4071eb 6479->6480 6480->6478 6481 4032fc 4 API calls 6480->6481 6481->6478 6483 403278 4 API calls 6482->6483 6484 4032c2 6483->6484 6484->6470 6485 402ccc 6486 402cdd 6485->6486 6490 402cfe 6485->6490 6487 402d88 RtlUnwind 6486->6487 6489 402b28 RaiseException 6486->6489 6486->6490 6488 403154 4 API calls 6487->6488 6488->6490 6491 402d7f 6489->6491 6491->6487 6812 403fcd 6813 403f07 4 API calls 6812->6813 6814 403fd6 6813->6814 6815 403e9c 4 API calls 6814->6815 6816 403fe2 6815->6816 5470 4024d0 5471 4024e4 5470->5471 5472 4024f7 5470->5472 5509 401918 RtlInitializeCriticalSection 5471->5509 5474 402518 5472->5474 5475 40250e RtlEnterCriticalSection 5472->5475 5486 402300 5474->5486 5475->5474 5478 4024ed 5480 402525 5483 402581 5480->5483 5484 402577 RtlLeaveCriticalSection 5480->5484 5482 402531 5482->5480 5516 40215c 5482->5516 5484->5483 5487 402314 5486->5487 5488 402335 5487->5488 5494 4023b8 5487->5494 5489 402344 5488->5489 5530 401b74 5488->5530 5489->5480 5496 401fd4 5489->5496 5493 402455 5493->5489 5537 401d00 5493->5537 5494->5489 5494->5493 5533 401d80 5494->5533 5541 401e84 5494->5541 5497 401fe8 5496->5497 5498 401ffb 5496->5498 5499 401918 4 API calls 5497->5499 5500 402012 RtlEnterCriticalSection 5498->5500 5503 40201c 5498->5503 5501 401fed 5499->5501 5500->5503 5501->5498 5502 401ff1 5501->5502 5508 402052 5502->5508 5503->5508 5623 401ee0 5503->5623 5506 402147 5506->5482 5507 40213d RtlLeaveCriticalSection 5507->5506 5508->5482 5510 401946 5509->5510 5511 40193c RtlEnterCriticalSection 5509->5511 5512 401964 LocalAlloc 5510->5512 5511->5510 5513 40197e 5512->5513 5514 4019c3 RtlLeaveCriticalSection 5513->5514 5515 4019cd 5513->5515 5514->5515 5515->5472 5515->5478 5517 40217a 5516->5517 5518 402175 5516->5518 5520 4021ab RtlEnterCriticalSection 5517->5520 5523 4021b5 5517->5523 5524 40217e 5517->5524 5519 401918 4 API calls 5518->5519 5519->5517 5520->5523 5521 4021c1 5525 4022e3 RtlLeaveCriticalSection 5521->5525 5526 4022ed 5521->5526 5522 402244 5522->5524 5527 401d80 7 API calls 5522->5527 5523->5521 5523->5522 5528 402270 5523->5528 5524->5480 5525->5526 5526->5480 5527->5524 5528->5521 5529 401d00 7 API calls 5528->5529 5529->5521 5531 40215c 9 API calls 5530->5531 5532 401b95 5531->5532 5532->5489 5534 401d89 5533->5534 5535 401d92 5533->5535 5534->5535 5536 401b74 9 API calls 5534->5536 5535->5494 5536->5535 5538 401d4e 5537->5538 5539 401d1e 5537->5539 5538->5539 5546 401c68 5538->5546 5539->5489 5601 401768 5541->5601 5543 401e99 5545 401ea6 5543->5545 5612 401dcc 5543->5612 5545->5494 5547 401c7a 5546->5547 5548 401c9d 5547->5548 5549 401caf 5547->5549 5559 40188c 5548->5559 5550 40188c 3 API calls 5549->5550 5552 401cad 5550->5552 5553 401cc5 5552->5553 5569 401b44 5552->5569 5553->5539 5555 401cd4 5556 401cee 5555->5556 5574 401b98 5555->5574 5579 4013a0 5556->5579 5560 4018b2 5559->5560 5561 40190b 5559->5561 5583 401658 5560->5583 5561->5552 5566 4018e6 5566->5561 5568 4013a0 LocalAlloc 5566->5568 5568->5561 5570 401b61 5569->5570 5571 401b52 5569->5571 5570->5555 5572 401d00 9 API calls 5571->5572 5573 401b5f 5572->5573 5573->5555 5575 401bab 5574->5575 5576 401b9d 5574->5576 5575->5556 5577 401b74 9 API calls 5576->5577 5578 401baa 5577->5578 5578->5556 5580 4013ab 5579->5580 5581 4013c6 5580->5581 5582 4012e4 LocalAlloc 5580->5582 5581->5553 5582->5581 5585 40168f 5583->5585 5584 4016cf 5587 40132c 5584->5587 5585->5584 5586 4016a9 VirtualFree 5585->5586 5586->5585 5588 401348 5587->5588 5595 4012e4 5588->5595 5591 40150c 5594 40153b 5591->5594 5592 401594 5592->5566 5593 401568 VirtualFree 5593->5594 5594->5592 5594->5593 5598 40128c 5595->5598 5599 401298 LocalAlloc 5598->5599 5600 4012aa 5598->5600 5599->5600 5600->5566 5600->5591 5602 401787 5601->5602 5603 40183b 5602->5603 5604 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5602->5604 5606 40132c LocalAlloc 5602->5606 5607 401821 5602->5607 5609 4017d6 5602->5609 5611 4017e7 5603->5611 5619 4015c4 5603->5619 5604->5602 5606->5602 5608 40150c VirtualFree 5607->5608 5608->5611 5610 40150c VirtualFree 5609->5610 5610->5611 5611->5543 5613 401d80 9 API calls 5612->5613 5614 401de0 5613->5614 5615 40132c LocalAlloc 5614->5615 5617 401df0 5615->5617 5616 401df8 5616->5545 5617->5616 5618 401b44 9 API calls 5617->5618 5618->5616 5620 40160a 5619->5620 5621 401626 VirtualAlloc 5620->5621 5622 40163a 5620->5622 5621->5620 5621->5622 5622->5611 5626 401ef0 5623->5626 5624 401f1c 5625 401d00 9 API calls 5624->5625 5628 401f40 5624->5628 5625->5628 5626->5624 5626->5628 5629 401e58 5626->5629 5628->5506 5628->5507 5634 4016d8 5629->5634 5632 401e75 5632->5626 5633 401dcc 9 API calls 5633->5632 5638 4016f4 5634->5638 5635 4016fe 5637 4015c4 VirtualAlloc 5635->5637 5641 40170a 5637->5641 5638->5635 5639 40175b 5638->5639 5640 40132c LocalAlloc 5638->5640 5642 40174f 5638->5642 5644 401430 5638->5644 5639->5632 5639->5633 5640->5638 5641->5639 5643 40150c VirtualFree 5642->5643 5643->5639 5645 40143f VirtualAlloc 5644->5645 5647 40146c 5645->5647 5648 40148f 5645->5648 5649 4012e4 LocalAlloc 5647->5649 5648->5638 5650 401478 5649->5650 5650->5648 5651 40147c VirtualFree 5650->5651 5651->5648 6492 4028d2 6493 4028da 6492->6493 6494 403554 4 API calls 6493->6494 6495 4028ef 6493->6495 6494->6493 6496 4025ac 4 API calls 6495->6496 6497 4028f4 6496->6497 6817 4019d3 6818 4019ba 6817->6818 6819 4019c3 RtlLeaveCriticalSection 6818->6819 6820 4019cd 6818->6820 6819->6820 6039 407fd4 6040 407fe6 6039->6040 6042 407fed 6039->6042 6050 407f10 6040->6050 6043 408021 6042->6043 6044 408015 6042->6044 6045 408017 6042->6045 6046 40804e 6043->6046 6048 407d7c 19 API calls 6043->6048 6064 407e2c 6044->6064 6061 407d7c 6045->6061 6048->6046 6051 407f25 6050->6051 6052 407d7c 19 API calls 6051->6052 6053 407f34 6051->6053 6052->6053 6054 407f6e 6053->6054 6055 407d7c 19 API calls 6053->6055 6056 407f82 6054->6056 6057 407d7c 19 API calls 6054->6057 6055->6054 6060 407fae 6056->6060 6071 407eb8 6056->6071 6057->6056 6060->6042 6074 4058b4 6061->6074 6063 407d9e 6063->6043 6065 405184 19 API calls 6064->6065 6066 407e57 6065->6066 6082 407de4 6066->6082 6068 407e5f 6069 403198 4 API calls 6068->6069 6070 407e74 6069->6070 6070->6043 6072 407ec7 VirtualFree 6071->6072 6073 407ed9 VirtualAlloc 6071->6073 6072->6073 6073->6060 6075 4058c0 6074->6075 6076 405184 19 API calls 6075->6076 6077 4058ed 6076->6077 6078 4031e8 4 API calls 6077->6078 6079 4058f8 6078->6079 6080 403198 4 API calls 6079->6080 6081 40590d 6080->6081 6081->6063 6083 4058b4 19 API calls 6082->6083 6084 407e06 6083->6084 6084->6068 6502 40a0d5 6503 40a105 6502->6503 6504 40a10f CreateWindowExA SetWindowLongA 6503->6504 6505 405184 19 API calls 6504->6505 6506 40a192 6505->6506 6507 4032fc 4 API calls 6506->6507 6508 40a1a0 6507->6508 6509 4032fc 4 API calls 6508->6509 6510 40a1ad 6509->6510 6511 406b7c 5 API calls 6510->6511 6512 40a1b9 6511->6512 6513 4032fc 4 API calls 6512->6513 6514 40a1c2 6513->6514 6515 4099a4 29 API calls 6514->6515 6516 40a1d4 6515->6516 6517 409884 5 API calls 6516->6517 6518 40a1e7 6516->6518 6517->6518 6519 40a220 6518->6519 6520 4094d8 9 API calls 6518->6520 6521 40a239 6519->6521 6524 40a233 RemoveDirectoryA 6519->6524 6520->6519 6522 40a242 73EA5CF0 6521->6522 6523 40a24d 6521->6523 6522->6523 6525 40a275 6523->6525 6526 40357c 4 API calls 6523->6526 6524->6521 6527 40a26b 6526->6527 6528 4025ac 4 API calls 6527->6528 6528->6525 6087 40a0e7 6088 40a0eb SetLastError 6087->6088 6119 409648 GetLastError 6088->6119 6091 40a105 6093 40a10f CreateWindowExA SetWindowLongA 6091->6093 6092 402f24 5 API calls 6092->6091 6094 405184 19 API calls 6093->6094 6095 40a192 6094->6095 6096 4032fc 4 API calls 6095->6096 6097 40a1a0 6096->6097 6098 4032fc 4 API calls 6097->6098 6099 40a1ad 6098->6099 6132 406b7c GetCommandLineA 6099->6132 6102 4032fc 4 API calls 6103 40a1c2 6102->6103 6137 4099a4 6103->6137 6106 409884 5 API calls 6107 40a1e7 6106->6107 6108 40a220 6107->6108 6109 40a207 6107->6109 6111 40a239 6108->6111 6114 40a233 RemoveDirectoryA 6108->6114 6153 4094d8 6109->6153 6112 40a242 73EA5CF0 6111->6112 6113 40a24d 6111->6113 6112->6113 6115 40a275 6113->6115 6161 40357c 6113->6161 6114->6111 6117 40a26b 6118 4025ac 4 API calls 6117->6118 6118->6115 6120 404c84 19 API calls 6119->6120 6121 40968f 6120->6121 6122 407284 5 API calls 6121->6122 6123 40969f 6122->6123 6124 408da8 4 API calls 6123->6124 6125 4096b4 6124->6125 6126 405880 4 API calls 6125->6126 6127 4096c3 6126->6127 6128 4031b8 4 API calls 6127->6128 6129 4096e2 6128->6129 6130 403198 4 API calls 6129->6130 6131 4096ea 6130->6131 6131->6091 6131->6092 6133 406af0 4 API calls 6132->6133 6134 406ba1 6133->6134 6135 403198 4 API calls 6134->6135 6136 406bbf 6135->6136 6136->6102 6138 4033b4 4 API calls 6137->6138 6139 4099df 6138->6139 6140 409a11 CreateProcessA 6139->6140 6141 409a24 CloseHandle 6140->6141 6142 409a1d 6140->6142 6144 409a2d 6141->6144 6143 409648 21 API calls 6142->6143 6143->6141 6174 409978 6144->6174 6147 409a49 6148 409978 3 API calls 6147->6148 6149 409a4e GetExitCodeProcess CloseHandle 6148->6149 6150 409a6e 6149->6150 6151 403198 4 API calls 6150->6151 6152 409a76 6151->6152 6152->6106 6152->6107 6154 409532 6153->6154 6158 4094eb 6153->6158 6154->6108 6155 4094f3 Sleep 6155->6158 6156 409503 Sleep 6156->6158 6158->6154 6158->6155 6158->6156 6159 40951a GetLastError 6158->6159 6178 408fbc 6158->6178 6159->6154 6160 409524 GetLastError 6159->6160 6160->6154 6160->6158 6162 4035a0 6161->6162 6163 403591 6161->6163 6164 4035b1 6162->6164 6165 4035b8 6162->6165 6168 4035d0 6163->6168 6169 40359b 6163->6169 6170 4035b6 6163->6170 6166 403198 4 API calls 6164->6166 6167 4031b8 4 API calls 6165->6167 6166->6170 6167->6170 6168->6170 6172 40357c 4 API calls 6168->6172 6169->6162 6171 4035ec 6169->6171 6170->6117 6171->6170 6186 403554 6171->6186 6172->6168 6175 40998c PeekMessageA 6174->6175 6176 409980 TranslateMessage DispatchMessageA 6175->6176 6177 40999e MsgWaitForMultipleObjects 6175->6177 6176->6175 6177->6144 6177->6147 6179 408f70 2 API calls 6178->6179 6180 408fd2 6179->6180 6181 408fd6 6180->6181 6182 408ff2 DeleteFileA GetLastError 6180->6182 6181->6158 6183 409010 6182->6183 6184 408fac Wow64RevertWow64FsRedirection 6183->6184 6185 409018 6184->6185 6185->6158 6187 403566 6186->6187 6189 403578 6187->6189 6190 403604 6187->6190 6189->6171 6191 40357c 6190->6191 6192 4035a0 6191->6192 6197 4035d0 6191->6197 6198 40359b 6191->6198 6199 4035b6 6191->6199 6193 4035b1 6192->6193 6194 4035b8 6192->6194 6195 403198 4 API calls 6193->6195 6196 4031b8 4 API calls 6194->6196 6195->6199 6196->6199 6197->6199 6201 40357c 4 API calls 6197->6201 6198->6192 6200 4035ec 6198->6200 6199->6187 6200->6199 6202 403554 4 API calls 6200->6202 6201->6197 6202->6200 6824 402be9 RaiseException 6825 402c04 6824->6825 6535 402af2 6536 402afe 6535->6536 6539 402ed0 6536->6539 6540 403154 4 API calls 6539->6540 6542 402ee0 6540->6542 6541 402b03 6542->6541 6544 402b0c 6542->6544 6545 402b25 6544->6545 6546 402b15 RaiseException 6544->6546 6545->6541 6546->6545 6826 402dfa 6827 402e26 6826->6827 6828 402e0d 6826->6828 6830 402ba4 6828->6830 6831 402bc9 6830->6831 6832 402bad 6830->6832 6831->6827 6833 402bb5 RaiseException 6832->6833 6833->6831 6834 4075fa GetFileSize 6835 407626 6834->6835 6836 407616 GetLastError 6834->6836 6836->6835 6837 40761f 6836->6837 6838 40748c 21 API calls 6837->6838 6838->6835 6839 406ffb 6840 407008 SetErrorMode 6839->6840 6551 403a80 CloseHandle 6552 403a90 6551->6552 6553 403a91 GetLastError 6551->6553 6554 40a282 6556 40a1f4 6554->6556 6555 40a220 6558 40a239 6555->6558 6561 40a233 RemoveDirectoryA 6555->6561 6556->6555 6557 4094d8 9 API calls 6556->6557 6557->6555 6559 40a242 73EA5CF0 6558->6559 6560 40a24d 6558->6560 6559->6560 6562 40a275 6560->6562 6563 40357c 4 API calls 6560->6563 6561->6558 6564 40a26b 6563->6564 6565 4025ac 4 API calls 6564->6565 6565->6562 6566 404283 6567 4042c3 6566->6567 6568 403154 4 API calls 6567->6568 6569 404323 6568->6569 6841 404185 6842 4041ff 6841->6842 6843 4041cc 6842->6843 6844 403154 4 API calls 6842->6844 6845 404323 6844->6845 6570 40a287 6571 40a290 6570->6571 6574 40a2bb 6570->6574 6580 409448 6571->6580 6573 40a295 6573->6574 6578 40a2b3 MessageBoxA 6573->6578 6575 403198 4 API calls 6574->6575 6576 40a2f3 6575->6576 6577 403198 4 API calls 6576->6577 6579 40a2fb 6577->6579 6578->6574 6581 409454 GetCurrentProcess OpenProcessToken 6580->6581 6582 4094af ExitWindowsEx 6580->6582 6583 409466 6581->6583 6584 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6581->6584 6582->6583 6583->6573 6584->6582 6584->6583 6585 403e87 6586 403e4c 6585->6586 6587 403e67 6586->6587 6588 403e62 6586->6588 6589 403e7b 6586->6589 6592 403e78 6587->6592 6598 402674 6587->6598 6594 403cc8 6588->6594 6591 402674 4 API calls 6589->6591 6591->6592 6595 403cd6 6594->6595 6596 402674 4 API calls 6595->6596 6597 403ceb 6595->6597 6596->6597 6597->6587 6599 403154 4 API calls 6598->6599 6600 40267a 6599->6600 6600->6592 6605 407e90 6606 407eb8 VirtualFree 6605->6606 6607 407e9d 6606->6607 6854 403991 6855 403983 6854->6855 6856 40374c VariantClear 6855->6856 6857 40398b 6856->6857 6858 405b92 6860 405b94 6858->6860 6859 405bd0 6863 405930 5 API calls 6859->6863 6860->6859 6861 405be7 6860->6861 6862 405bca 6860->6862 6867 404ccc 5 API calls 6861->6867 6862->6859 6864 405c3c 6862->6864 6865 405be3 6863->6865 6866 4059a0 19 API calls 6864->6866 6868 403198 4 API calls 6865->6868 6866->6865 6869 405c10 6867->6869 6870 405c76 6868->6870 6871 4059a0 19 API calls 6869->6871 6871->6865 6610 403e95 6611 403e4c 6610->6611 6612 403e62 6611->6612 6613 403e7b 6611->6613 6615 403e67 6611->6615 6614 403cc8 4 API calls 6612->6614 6616 402674 4 API calls 6613->6616 6614->6615 6617 403e78 6615->6617 6618 402674 4 API calls 6615->6618 6616->6617 6618->6617 6619 403a97 6620 403aac 6619->6620 6621 403bbc GetStdHandle 6620->6621 6622 403b0e CreateFileA 6620->6622 6632 403ab2 6620->6632 6623 403c17 GetLastError 6621->6623 6627 403bba 6621->6627 6622->6623 6624 403b2c 6622->6624 6623->6632 6626 403b3b GetFileSize 6624->6626 6624->6627 6626->6623 6628 403b4e SetFilePointer 6626->6628 6629 403be7 GetFileType 6627->6629 6627->6632 6628->6623 6633 403b6a ReadFile 6628->6633 6631 403c02 CloseHandle 6629->6631 6629->6632 6631->6632 6633->6623 6634 403b8c 6633->6634 6634->6627 6635 403b9f SetFilePointer 6634->6635 6635->6623 6636 403bb0 SetEndOfFile 6635->6636 6636->6623 6636->6627 6890 4011aa 6891 4011ac GetStdHandle 6890->6891 6229 4076ac SetEndOfFile 6230 4076c3 6229->6230 6231 4076bc 6229->6231 6232 40748c 21 API calls 6231->6232 6232->6230 6640 4028ac 6641 402594 4 API calls 6640->6641 6642 4028b6 6641->6642 6643 401ab9 6644 401a96 6643->6644 6645 401aa9 RtlDeleteCriticalSection 6644->6645 6646 401a9f RtlLeaveCriticalSection 6644->6646 6646->6645

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 133 409bb3-409bc0 VirtualProtect 132->133 133->121
                                                                  APIs
                                                                  • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                                  • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                                  • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                                  • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                                  • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$ProtectQuery$InfoSystem
                                                                  • String ID:
                                                                  • API String ID: 2441996862-0
                                                                  • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                  • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                                  • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                                  • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                  • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                                  • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                                  • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                  • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                  • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                  • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModulePolicyProcess
                                                                  • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                  • API String ID: 3256987805-3653653586
                                                                  • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                  • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                  • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                  • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • SetLastError.KERNEL32 ref: 0040A0F4
                                                                    • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021515A8), ref: 0040966C
                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                  • SetWindowLongA.USER32(000203DC,000000FC,00409918), ref: 0040A148
                                                                  • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                  • 73EA5CF0.USER32(000203DC,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                  • API String ID: 3341979996-3001827809
                                                                  • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                  • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                                  • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                                  • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                  • API String ID: 1646373207-2130885113
                                                                  • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                  • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                                  • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                                  • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                                  • SetWindowLongA.USER32(000203DC,000000FC,00409918), ref: 0040A148
                                                                    • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                                    • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021515A8,00409A90,00000000,00409A77), ref: 00409A14
                                                                    • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021515A8,00409A90,00000000), ref: 00409A28
                                                                    • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                    • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                    • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021515A8,00409A90), ref: 00409A5C
                                                                  • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                                  • 73EA5CF0.USER32(000203DC,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                  • API String ID: 978128352-3001827809
                                                                  • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                  • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                                  • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                                  • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021515A8,00409A90,00000000,00409A77), ref: 00409A14
                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021515A8,00409A90,00000000), ref: 00409A28
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                  • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021515A8,00409A90), ref: 00409A5C
                                                                    • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021515A8), ref: 0040966C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                  • String ID: D
                                                                  • API String ID: 3356880605-2746444292
                                                                  • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                  • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                                  • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                                  • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: .tmp$y@
                                                                  • API String ID: 2030045667-2396523267
                                                                  • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                  • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                                  • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                                  • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: .tmp$y@
                                                                  • API String ID: 2030045667-2396523267
                                                                  • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                  • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                                  • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                                  • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID: .tmp
                                                                  • API String ID: 1375471231-2986845003
                                                                  • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                  • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                                  • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                                  • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 321 407749-40774a 322 4076dc-4076e6 WriteFile 321->322 323 40774c-40776f 321->323 325 4076e8-4076ea call 40748c 322->325 326 4076ef-4076f2 322->326 324 407770-407785 323->324 327 407787 324->327 328 4077f9 324->328 325->326 330 407700-407704 326->330 331 4076f4-4076fb call 4073ec 326->331 333 40778a-40778f 327->333 334 4077fd-407802 327->334 335 40783b-40783d 328->335 336 4077fb 328->336 331->330 339 407803-407819 333->339 341 407791-407792 333->341 334->339 337 407841-407843 335->337 336->334 340 40785b-40785c 337->340 339->340 350 40781b 339->350 342 4078d6-4078eb call 407890 InterlockedExchange 340->342 343 40785e-40788c 340->343 344 407724-407741 341->344 345 407794-4077b4 341->345 366 407912-407917 342->366 367 4078ed-407910 342->367 360 407820-407823 343->360 361 407890-407893 343->361 347 407743 344->347 348 4077b5 344->348 345->348 352 407746-407747 347->352 353 4077b9 347->353 355 4077b6-4077b7 348->355 356 4077f7-4077f8 348->356 357 40781e-40781f 350->357 352->321 359 4077bb-4077cd 352->359 353->359 355->353 356->328 357->360 359->337 364 4077cf-4077d4 359->364 363 407898 360->363 365 407824 360->365 361->363 368 40789a 363->368 364->335 371 4077d6-4077de 364->371 365->368 370 407825 365->370 367->366 367->367 374 40789f 368->374 372 407896-407897 370->372 373 407826-40782d 370->373 371->324 383 4077e0 371->383 372->363 376 4078a1 373->376 377 40782f 373->377 374->376 381 4078a3 376->381 382 4078ac 376->382 379 407832-407833 377->379 380 4078a5-4078aa 377->380 379->335 379->357 384 4078ae-4078af 380->384 381->380 382->384 383->356 384->374 385 4078b1-4078bd 384->385 385->363 386 4078bf-4078c0 385->386
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                  • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                                  • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                                  • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 387 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLibraryLoadMode
                                                                  • String ID:
                                                                  • API String ID: 2987862817-0
                                                                  • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                  • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                  • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                  • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 397 40766c-407691 SetFilePointer 398 4076a3-4076a8 397->398 399 407693-40769a GetLastError 397->399 399->398 400 40769c-40769e call 40748c 399->400 400->398
                                                                  APIs
                                                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021403AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FilePointer
                                                                  • String ID:
                                                                  • API String ID: 1156039329-0
                                                                  • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                  • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                  • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                  • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 391 40762c-40764a ReadFile 392 407663-40766a 391->392 393 40764c-407650 391->393 394 407652-40765a GetLastError 393->394 395 40765c-40765e call 40748c 393->395 394->392 394->395 395->392
                                                                  APIs
                                                                  • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                  • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastRead
                                                                  • String ID:
                                                                  • API String ID: 1948546556-0
                                                                  • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                  • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                  • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                  • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 402 4075c4-4075e5 SetFilePointer 403 4075f7-4075f9 402->403 404 4075e7-4075ee GetLastError 402->404 404->403 405 4075f0-4075f2 call 40748c 404->405 405->403
                                                                  APIs
                                                                  • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                  • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021403AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FilePointer
                                                                  • String ID:
                                                                  • API String ID: 1156039329-0
                                                                  • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                  • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                  • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                  • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 2087232378-0
                                                                  • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                  • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                  • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                  • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                                    • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                                    • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                  • String ID:
                                                                  • API String ID: 1658689577-0
                                                                  • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                  • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                                  • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                                  • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                  • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                  • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                  • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                  • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                  • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                  • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                  • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                  • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                  • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021403AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastWrite
                                                                  • String ID:
                                                                  • API String ID: 442123175-0
                                                                  • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                  • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                  • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                  • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                  APIs
                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FormatMessage
                                                                  • String ID:
                                                                  • API String ID: 1306739567-0
                                                                  • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                  • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                  • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                                  • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                  APIs
                                                                  • SetEndOfFile.KERNEL32(?,02164000,0040A08C,00000000), ref: 004076B3
                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021403AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 734332943-0
                                                                  • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                  • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                  • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                  • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                  • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                  • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                  • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                  • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                  • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                  • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                  APIs
                                                                  • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrev
                                                                  • String ID:
                                                                  • API String ID: 122130370-0
                                                                  • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                  • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                  • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                  • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                                  • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                                  • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                  • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                  • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                  • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                  • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                  • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                  • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                  • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                  • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                  • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                  • String ID: SeShutdownPrivilege
                                                                  • API String ID: 107509674-3733053543
                                                                  • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                  • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                  • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                  • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                                  • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                                  • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                                  • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                  • String ID:
                                                                  • API String ID: 3473537107-0
                                                                  • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                  • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                                  • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                                  • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                  • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                                  • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                                  • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                                  APIs
                                                                  • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: SystemTime
                                                                  • String ID:
                                                                  • API String ID: 2656138-0
                                                                  • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                  • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                  • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                  • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                  • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                                  • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                                  • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                  • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                  • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                  • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCloseHandleModuleProc
                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                  • API String ID: 4190037839-2401316094
                                                                  • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                  • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                  • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                                  • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                  • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                  • String ID:
                                                                  • API String ID: 1694776339-0
                                                                  • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                  • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                  • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                  • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                  APIs
                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                  • LocalFree.KERNEL32(006C03D8,00000000,00401AB4), ref: 00401A1B
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,006C03D8,00000000,00401AB4), ref: 00401A3A
                                                                  • LocalFree.KERNEL32(006BE880,?,00000000,00008000,006C03D8,00000000,00401AB4), ref: 00401A79
                                                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                  • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                  • String ID: tk
                                                                  • API String ID: 3782394904-23409012
                                                                  • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                  • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                  • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                  • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                                    • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                    • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale$DefaultSystem
                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                  • API String ID: 1044490935-665933166
                                                                  • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                  • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                                  • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                                  • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                  • ExitProcess.KERNEL32 ref: 00403DE5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ExitMessageProcess
                                                                  • String ID: Error$Runtime error at 00000000$9@
                                                                  • API String ID: 1220098344-1503883590
                                                                  • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                  • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                  • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                  • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                  APIs
                                                                  • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                  • String ID: tk
                                                                  • API String ID: 730355536-23409012
                                                                  • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                  • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                  • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                  • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                  • String ID:
                                                                  • API String ID: 262959230-0
                                                                  • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                  • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                  • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                                  • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                                  • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CommandHandleLineModule
                                                                  • String ID: U1hd.@$h'j
                                                                  • API String ID: 2123368496-3788664753
                                                                  • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                  • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                  • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                  • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID: )q@
                                                                  • API String ID: 3660427363-2284170586
                                                                  • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                  • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                                  • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                                  • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                                  APIs
                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3383049259.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3382984741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383161114.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3383195779.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastSleep
                                                                  • String ID:
                                                                  • API String ID: 1458359878-0
                                                                  • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                  • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                  • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                                  • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                  Execution Graph

                                                                  Execution Coverage:15.7%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:4.3%
                                                                  Total number of Nodes:2000
                                                                  Total number of Limit Nodes:72
                                                                  execution_graph 50157 40cf00 50158 40cf0d 50157->50158 50160 40cf12 50157->50160 50161 406f50 CloseHandle 50158->50161 50161->50160 56334 4413a4 56335 4413ad 56334->56335 56336 4413bb WriteFile 56334->56336 56335->56336 56337 4413c6 56336->56337 50162 492208 50163 49223c 50162->50163 50164 49223e 50163->50164 50165 492252 50163->50165 50308 446fac 18 API calls 50164->50308 50168 492261 50165->50168 50170 49228e 50165->50170 50167 492247 Sleep 50190 4922c5 50167->50190 50169 447008 18 API calls 50168->50169 50172 492270 50169->50172 50174 4922ca 50170->50174 50175 49229d 50170->50175 50176 492278 FindWindowA 50172->50176 50180 4922d9 50174->50180 50181 492320 50174->50181 50298 447008 50175->50298 50178 447288 5 API calls 50176->50178 50182 492289 50178->50182 50179 4922aa 50184 4922b2 FindWindowA 50179->50184 50309 446fac 18 API calls 50180->50309 50187 49237c 50181->50187 50188 49232f 50181->50188 50182->50190 50302 447288 50184->50302 50185 4922e5 50310 446fac 18 API calls 50185->50310 50197 4923d8 50187->50197 50198 49238b 50187->50198 50313 446fac 18 API calls 50188->50313 50348 403420 50190->50348 50192 4922f2 50311 446fac 18 API calls 50192->50311 50193 49233b 50314 446fac 18 API calls 50193->50314 50196 4922ff 50312 446fac 18 API calls 50196->50312 50208 492412 50197->50208 50209 4923e7 50197->50209 50318 446fac 18 API calls 50198->50318 50200 492348 50315 446fac 18 API calls 50200->50315 50202 492397 50319 446fac 18 API calls 50202->50319 50204 49230a SendMessageA 50207 447288 5 API calls 50204->50207 50206 492355 50316 446fac 18 API calls 50206->50316 50207->50182 50217 492421 50208->50217 50218 492460 50208->50218 50212 447008 18 API calls 50209->50212 50210 4923a4 50320 446fac 18 API calls 50210->50320 50215 4923f4 50212->50215 50214 492360 PostMessageA 50317 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50214->50317 50220 4923fc RegisterClipboardFormatA 50215->50220 50216 4923b1 50321 446fac 18 API calls 50216->50321 50323 446fac 18 API calls 50217->50323 50226 49246f 50218->50226 50227 4924b4 50218->50227 50223 447288 5 API calls 50220->50223 50223->50190 50224 4923bc SendNotifyMessageA 50322 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50224->50322 50225 49242d 50324 446fac 18 API calls 50225->50324 50326 446fac 18 API calls 50226->50326 50236 492508 50227->50236 50237 4924c3 50227->50237 50231 49243a 50325 446fac 18 API calls 50231->50325 50232 49247b 50327 446fac 18 API calls 50232->50327 50235 492445 SendMessageA 50240 447288 5 API calls 50235->50240 50245 49256a 50236->50245 50246 492517 50236->50246 50330 446fac 18 API calls 50237->50330 50239 492488 50328 446fac 18 API calls 50239->50328 50240->50182 50241 4924cf 50331 446fac 18 API calls 50241->50331 50244 492493 PostMessageA 50329 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50244->50329 50253 492579 50245->50253 50254 4925f1 50245->50254 50249 447008 18 API calls 50246->50249 50247 4924dc 50332 446fac 18 API calls 50247->50332 50251 492524 50249->50251 50334 42e3a4 SetErrorMode 50251->50334 50252 4924e7 SendNotifyMessageA 50333 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50252->50333 50257 447008 18 API calls 50253->50257 50263 492600 50254->50263 50264 492626 50254->50264 50261 492588 50257->50261 50258 492531 50259 492547 GetLastError 50258->50259 50260 492537 50258->50260 50265 447288 5 API calls 50259->50265 50262 447288 5 API calls 50260->50262 50337 446fac 18 API calls 50261->50337 50266 492545 50262->50266 50342 446fac 18 API calls 50263->50342 50273 492658 50264->50273 50274 492635 50264->50274 50265->50266 50270 447288 5 API calls 50266->50270 50269 49260a FreeLibrary 50343 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50269->50343 50270->50190 50271 49259b GetProcAddress 50275 4925e1 50271->50275 50276 4925a7 50271->50276 50281 492667 50273->50281 50287 49269b 50273->50287 50277 447008 18 API calls 50274->50277 50341 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50275->50341 50338 446fac 18 API calls 50276->50338 50279 492641 50277->50279 50285 492649 CreateMutexA 50279->50285 50344 48c638 18 API calls 50281->50344 50282 4925b3 50339 446fac 18 API calls 50282->50339 50285->50190 50286 4925c0 50290 447288 5 API calls 50286->50290 50287->50190 50346 48c638 18 API calls 50287->50346 50289 492673 50291 492684 OemToCharBuffA 50289->50291 50292 4925d1 50290->50292 50345 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50291->50345 50340 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50292->50340 50295 4926b6 50296 4926c7 CharToOemBuffA 50295->50296 50347 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50296->50347 50299 447010 50298->50299 50352 436088 50299->50352 50301 44702f 50301->50179 50303 447290 50302->50303 50406 4363f0 VariantClear 50303->50406 50305 4472b3 50307 4472ca 50305->50307 50407 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50305->50407 50307->50190 50308->50167 50309->50185 50310->50192 50311->50196 50312->50204 50313->50193 50314->50200 50315->50206 50316->50214 50317->50182 50318->50202 50319->50210 50320->50216 50321->50224 50322->50190 50323->50225 50324->50231 50325->50235 50326->50232 50327->50239 50328->50244 50329->50182 50330->50241 50331->50247 50332->50252 50333->50190 50408 403738 50334->50408 50337->50271 50338->50282 50339->50286 50340->50182 50341->50182 50342->50269 50343->50190 50344->50289 50345->50190 50346->50295 50347->50190 50350 403426 50348->50350 50349 40344b 50350->50349 50351 402660 4 API calls 50350->50351 50351->50350 50353 436094 50352->50353 50369 4360b6 50352->50369 50353->50369 50372 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50353->50372 50354 436139 50381 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50354->50381 50356 436121 50376 403494 50356->50376 50357 436109 50361 403510 4 API calls 50357->50361 50358 4360fd 50373 403510 50358->50373 50359 43612d 50380 4040e8 18 API calls 50359->50380 50366 436112 50361->50366 50365 43614a 50365->50301 50366->50301 50367 436115 50367->50301 50369->50354 50369->50356 50369->50357 50369->50358 50369->50359 50369->50367 50370 436136 50370->50301 50372->50369 50382 4034e0 50373->50382 50377 403498 50376->50377 50378 4034ba 50377->50378 50379 402660 4 API calls 50377->50379 50378->50301 50379->50378 50380->50370 50381->50365 50387 4034bc 50382->50387 50384 4034f0 50392 403400 50384->50392 50388 4034c0 50387->50388 50389 4034dc 50387->50389 50396 402648 50388->50396 50389->50384 50391 4034c9 50391->50384 50393 40341f 50392->50393 50394 403406 50392->50394 50393->50301 50394->50393 50401 402660 50394->50401 50397 40264c 50396->50397 50398 402656 50396->50398 50397->50398 50400 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50397->50400 50398->50391 50398->50398 50400->50398 50402 402664 50401->50402 50403 40266e 50401->50403 50402->50403 50405 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50402->50405 50403->50393 50403->50403 50405->50403 50406->50305 50407->50307 50409 40373c LoadLibraryA 50408->50409 50409->50258 50410 402584 50411 402598 50410->50411 50412 4025ab 50410->50412 50440 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50411->50440 50414 4025c2 RtlEnterCriticalSection 50412->50414 50415 4025cc 50412->50415 50414->50415 50426 4023b4 13 API calls 50415->50426 50416 40259d 50416->50412 50418 4025a1 50416->50418 50419 4025d5 50420 4025d9 50419->50420 50427 402088 50419->50427 50422 402635 50420->50422 50423 40262b RtlLeaveCriticalSection 50420->50423 50423->50422 50424 4025e5 50424->50420 50441 402210 9 API calls 50424->50441 50426->50419 50428 40209c 50427->50428 50429 4020af 50427->50429 50448 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50428->50448 50431 4020c6 RtlEnterCriticalSection 50429->50431 50434 4020d0 50429->50434 50431->50434 50432 4020a1 50432->50429 50433 4020a5 50432->50433 50437 402106 50433->50437 50434->50437 50442 401f94 50434->50442 50437->50424 50438 4021f1 RtlLeaveCriticalSection 50439 4021fb 50438->50439 50439->50424 50440->50416 50441->50420 50445 401fa4 50442->50445 50443 401fd0 50447 401ff4 50443->50447 50454 401db4 50443->50454 50445->50443 50445->50447 50449 401f0c 50445->50449 50447->50438 50447->50439 50448->50432 50458 40178c 50449->50458 50452 401f29 50452->50445 50455 401e02 50454->50455 50456 401dd2 50454->50456 50455->50456 50481 401d1c 50455->50481 50456->50447 50462 4017a8 50458->50462 50459 4017b2 50477 401678 VirtualAlloc 50459->50477 50462->50459 50463 40180f 50462->50463 50465 401803 50462->50465 50469 4014e4 50462->50469 50478 4013e0 LocalAlloc 50462->50478 50463->50452 50468 401e80 9 API calls 50463->50468 50479 4015c0 VirtualFree 50465->50479 50466 4017be 50466->50463 50468->50452 50470 4014f3 VirtualAlloc 50469->50470 50472 401520 50470->50472 50473 401543 50470->50473 50480 401398 LocalAlloc 50472->50480 50473->50462 50475 40152c 50475->50473 50476 401530 VirtualFree 50475->50476 50476->50473 50477->50466 50478->50462 50479->50463 50480->50475 50482 401d2e 50481->50482 50483 401d51 50482->50483 50484 401d63 50482->50484 50494 401940 50483->50494 50486 401940 3 API calls 50484->50486 50487 401d61 50486->50487 50488 401d79 50487->50488 50504 401bf8 9 API calls 50487->50504 50488->50456 50490 401d88 50491 401da2 50490->50491 50505 401c4c 9 API calls 50490->50505 50506 401454 LocalAlloc 50491->50506 50495 401966 50494->50495 50503 4019bf 50494->50503 50507 40170c 50495->50507 50499 401983 50500 40199a 50499->50500 50512 4015c0 VirtualFree 50499->50512 50500->50503 50513 401454 LocalAlloc 50500->50513 50503->50487 50504->50490 50505->50491 50506->50488 50509 401743 50507->50509 50508 401783 50511 4013e0 LocalAlloc 50508->50511 50509->50508 50510 40175d VirtualFree 50509->50510 50510->50509 50511->50499 50512->50500 50513->50503 56338 48042c 56343 450ff0 56338->56343 56340 480440 56353 47f518 56340->56353 56342 480464 56344 450ffd 56343->56344 56346 451051 56344->56346 56359 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56344->56359 56347 450e74 InterlockedExchange 56346->56347 56348 451063 56347->56348 56350 451079 56348->56350 56360 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56348->56360 56351 4510bc 56350->56351 56361 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56350->56361 56351->56340 56362 40b5c8 56353->56362 56355 47f585 56355->56342 56356 4069e4 4 API calls 56358 47f53a 56356->56358 56358->56355 56358->56356 56366 4768b0 56358->56366 56359->56346 56360->56350 56361->56351 56363 40b5d3 56362->56363 56364 40b5f3 56363->56364 56382 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56363->56382 56364->56358 56375 47692a 56366->56375 56380 4768e1 56366->56380 56367 451280 21 API calls 56367->56380 56368 476975 56383 451280 56368->56383 56370 4038a4 4 API calls 56370->56380 56371 47698c 56373 403420 4 API calls 56371->56373 56372 4038a4 4 API calls 56372->56375 56374 4769a6 56373->56374 56374->56358 56375->56368 56375->56372 56378 403744 4 API calls 56375->56378 56379 403450 4 API calls 56375->56379 56381 451280 21 API calls 56375->56381 56376 403744 4 API calls 56376->56380 56377 403450 4 API calls 56377->56380 56378->56375 56379->56375 56380->56367 56380->56370 56380->56375 56380->56376 56380->56377 56381->56375 56382->56364 56384 451290 56383->56384 56385 45129b 56383->56385 56384->56371 56389 451224 21 API calls 56385->56389 56387 4512a6 56387->56384 56390 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56387->56390 56389->56387 56390->56384 56391 41ee64 56392 41ee73 IsWindowVisible 56391->56392 56393 41eea9 56391->56393 56392->56393 56394 41ee7d IsWindowEnabled 56392->56394 56394->56393 56395 41ee87 56394->56395 56396 402648 4 API calls 56395->56396 56397 41ee91 EnableWindow 56396->56397 56397->56393 56398 41fb68 56399 41fb71 56398->56399 56402 41fe0c 56399->56402 56401 41fb7e 56403 41fefe 56402->56403 56404 41fe23 56402->56404 56403->56401 56404->56403 56423 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56404->56423 56406 41fe59 56407 41fe83 56406->56407 56408 41fe5d 56406->56408 56433 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56407->56433 56424 41fbac 56408->56424 56412 41fe91 56414 41fe95 56412->56414 56415 41febb 56412->56415 56413 41fbac 10 API calls 56417 41fe81 56413->56417 56418 41fbac 10 API calls 56414->56418 56416 41fbac 10 API calls 56415->56416 56419 41fecd 56416->56419 56417->56401 56420 41fea7 56418->56420 56421 41fbac 10 API calls 56419->56421 56422 41fbac 10 API calls 56420->56422 56421->56417 56422->56417 56423->56406 56425 41fbc7 56424->56425 56426 41f94c 4 API calls 56425->56426 56427 41fbdd 56425->56427 56426->56427 56434 41f94c 56427->56434 56429 41fc25 56430 41fc48 SetScrollInfo 56429->56430 56442 41faac 56430->56442 56433->56412 56435 4181f0 56434->56435 56436 41f969 GetWindowLongA 56435->56436 56437 41f9a6 56436->56437 56438 41f986 56436->56438 56454 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56437->56454 56453 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56438->56453 56441 41f992 56441->56429 56443 41faba 56442->56443 56444 41fac2 56442->56444 56443->56413 56445 41fb01 56444->56445 56446 41faf1 56444->56446 56451 41faff 56444->56451 56456 417e58 IsWindowVisible ScrollWindow SetWindowPos 56445->56456 56455 417e58 IsWindowVisible ScrollWindow SetWindowPos 56446->56455 56448 41fb41 GetScrollPos 56448->56443 56450 41fb4c 56448->56450 56452 41fb5b SetScrollPos 56450->56452 56451->56448 56452->56443 56453->56441 56454->56441 56455->56451 56456->56451 56457 4205a8 56458 4205bb 56457->56458 56478 415b40 56458->56478 56460 4205f6 56461 420702 56460->56461 56462 420661 56460->56462 56471 420652 MulDiv 56460->56471 56465 420719 56461->56465 56485 4146e4 KiUserCallbackDispatcher 56461->56485 56483 420858 20 API calls 56462->56483 56464 420730 56468 420752 56464->56468 56487 420070 12 API calls 56464->56487 56465->56464 56486 414728 KiUserCallbackDispatcher 56465->56486 56469 42067a 56469->56461 56484 420070 12 API calls 56469->56484 56482 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 56471->56482 56474 420697 56475 4206b3 MulDiv 56474->56475 56476 4206d6 56474->56476 56475->56476 56476->56461 56477 4206df MulDiv 56476->56477 56477->56461 56479 415b52 56478->56479 56488 414480 56479->56488 56481 415b6a 56481->56460 56482->56462 56483->56469 56484->56474 56485->56465 56486->56464 56487->56468 56489 41449a 56488->56489 56492 410658 56489->56492 56491 4144b0 56491->56481 56495 40dea4 56492->56495 56494 41065e 56494->56491 56496 40df06 56495->56496 56497 40deb7 56495->56497 56502 40df14 56496->56502 56500 40df14 19 API calls 56497->56500 56501 40dee1 56500->56501 56501->56494 56503 40df24 56502->56503 56505 40df3a 56503->56505 56514 40e29c 56503->56514 56530 40d7e0 56503->56530 56533 40e14c 56505->56533 56508 40d7e0 5 API calls 56509 40df42 56508->56509 56509->56508 56510 40dfae 56509->56510 56536 40dd60 56509->56536 56512 40e14c 5 API calls 56510->56512 56513 40df10 56512->56513 56513->56494 56550 40eb6c 56514->56550 56516 403778 4 API calls 56518 40e2d7 56516->56518 56517 40e38d 56519 40e3b7 56517->56519 56520 40e3a8 56517->56520 56518->56516 56518->56517 56613 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56518->56613 56614 40e280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56518->56614 56610 40bc24 56519->56610 56559 40e5c0 56520->56559 56525 40e3b5 56527 403400 4 API calls 56525->56527 56528 40e45c 56527->56528 56528->56503 56531 40ec08 5 API calls 56530->56531 56532 40d7ea 56531->56532 56532->56503 56647 40d6bc 56533->56647 56656 40e154 56536->56656 56539 40eb6c 5 API calls 56540 40dd9e 56539->56540 56541 40eb6c 5 API calls 56540->56541 56542 40dda9 56541->56542 56543 40ddc4 56542->56543 56544 40ddbb 56542->56544 56549 40ddc1 56542->56549 56663 40dbd8 56543->56663 56666 40dcc8 19 API calls 56544->56666 56547 403420 4 API calls 56548 40de8f 56547->56548 56548->56509 56549->56547 56616 40d980 56550->56616 56553 4034e0 4 API calls 56554 40eb8f 56553->56554 56555 403744 4 API calls 56554->56555 56556 40eb96 56555->56556 56557 40d980 5 API calls 56556->56557 56558 40eba4 56557->56558 56558->56518 56560 40e5f6 56559->56560 56561 40e5ec 56559->56561 56563 40e711 56560->56563 56564 40e695 56560->56564 56565 40e6f6 56560->56565 56566 40e776 56560->56566 56567 40e638 56560->56567 56568 40e6d9 56560->56568 56569 40e67a 56560->56569 56570 40e6bb 56560->56570 56581 40e65c 56560->56581 56621 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56561->56621 56571 40d964 5 API calls 56563->56571 56629 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56564->56629 56634 40ea90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56565->56634 56575 40d964 5 API calls 56566->56575 56622 40d964 56567->56622 56632 40eba8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56568->56632 56628 40da18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56569->56628 56631 40dfe4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56570->56631 56580 40e719 56571->56580 56574 403400 4 API calls 56582 40e7eb 56574->56582 56583 40e77e 56575->56583 56587 40e723 56580->56587 56588 40e71d 56580->56588 56581->56574 56582->56525 56589 40e782 56583->56589 56590 40e79b 56583->56590 56584 40e6e4 56633 409f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56584->56633 56586 40e6a0 56630 40d670 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56586->56630 56635 40ec08 56587->56635 56597 40e721 56588->56597 56598 40e73c 56588->56598 56600 40ec08 5 API calls 56589->56600 56641 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56590->56641 56592 40e661 56627 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56592->56627 56593 40e644 56625 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56593->56625 56639 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56597->56639 56602 40ec08 5 API calls 56598->56602 56600->56581 56605 40e744 56602->56605 56603 40e64f 56626 40e46c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56603->56626 56638 40daa0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56605->56638 56607 40e766 56640 40e4d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56607->56640 56642 40bbd0 56610->56642 56613->56518 56614->56518 56615 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56615->56525 56619 40d98b 56616->56619 56617 40d9c5 56617->56553 56619->56617 56620 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56619->56620 56620->56619 56621->56560 56623 40ec08 5 API calls 56622->56623 56624 40d96e 56623->56624 56624->56592 56624->56593 56625->56603 56626->56581 56627->56581 56628->56581 56629->56586 56630->56581 56631->56581 56632->56584 56633->56581 56634->56581 56636 40d980 5 API calls 56635->56636 56637 40ec15 56636->56637 56637->56581 56638->56581 56639->56607 56640->56581 56641->56581 56643 40bbe2 56642->56643 56644 40bc07 56642->56644 56643->56644 56646 40bc84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56643->56646 56644->56525 56644->56615 56646->56644 56648 40ec08 5 API calls 56647->56648 56649 40d6c9 56648->56649 56650 40d6dc 56649->56650 56654 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56649->56654 56650->56509 56652 40d6d7 56655 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56652->56655 56654->56652 56655->56650 56657 40d964 5 API calls 56656->56657 56658 40e16b 56657->56658 56659 40ec08 5 API calls 56658->56659 56662 40dd93 56658->56662 56660 40e178 56659->56660 56660->56662 56667 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56660->56667 56662->56539 56668 40ad7c 19 API calls 56663->56668 56665 40dc00 56665->56549 56666->56549 56667->56662 56668->56665 50514 491444 50515 49147e 50514->50515 50516 49148a 50515->50516 50517 491480 50515->50517 50519 491499 50516->50519 50520 4914c2 50516->50520 50710 4090a0 MessageBeep 50517->50710 50522 447008 18 API calls 50519->50522 50525 4914fa 50520->50525 50526 4914d1 50520->50526 50521 403420 4 API calls 50523 491ad6 50521->50523 50524 4914a6 50522->50524 50527 403400 4 API calls 50523->50527 50711 406bb8 50524->50711 50535 491509 50525->50535 50536 491532 50525->50536 50529 447008 18 API calls 50526->50529 50530 491ade 50527->50530 50532 4914de 50529->50532 50719 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50532->50719 50538 447008 18 API calls 50535->50538 50541 49155a 50536->50541 50542 491541 50536->50542 50537 4914e9 50720 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50537->50720 50540 491516 50538->50540 50721 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50540->50721 50549 491569 50541->50549 50550 49158e 50541->50550 50723 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 50542->50723 50545 491521 50722 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50545->50722 50546 491549 50724 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50546->50724 50551 447008 18 API calls 50549->50551 50553 49159d 50550->50553 50554 4915c6 50550->50554 50552 491576 50551->50552 50725 4072b0 50552->50725 50557 447008 18 API calls 50553->50557 50560 4915fe 50554->50560 50561 4915d5 50554->50561 50556 49157e 50728 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50556->50728 50559 4915aa 50557->50559 50729 42c814 50559->50729 50568 49164a 50560->50568 50569 49160d 50560->50569 50563 447008 18 API calls 50561->50563 50565 4915e2 50563->50565 50739 407200 8 API calls 50565->50739 50574 491659 50568->50574 50577 491682 50568->50577 50571 447008 18 API calls 50569->50571 50570 4915ed 50740 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50570->50740 50573 49161c 50571->50573 50575 447008 18 API calls 50573->50575 50576 447008 18 API calls 50574->50576 50578 49162d 50575->50578 50579 491666 50576->50579 50581 4916ba 50577->50581 50582 491691 50577->50582 50741 491148 8 API calls 50578->50741 50743 42c8b4 50579->50743 50592 4916c9 50581->50592 50593 4916f2 50581->50593 50585 447008 18 API calls 50582->50585 50583 491639 50742 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50583->50742 50588 49169e 50585->50588 50749 42c8dc 50588->50749 50589 491485 50589->50521 50595 447008 18 API calls 50592->50595 50598 49172a 50593->50598 50599 491701 50593->50599 50597 4916d6 50595->50597 50758 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50597->50758 50606 491739 50598->50606 50607 491762 50598->50607 50601 447008 18 API calls 50599->50601 50603 49170e 50601->50603 50602 4916e1 50759 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50602->50759 50760 42c93c 50603->50760 50609 447008 18 API calls 50606->50609 50613 4917ae 50607->50613 50614 491771 50607->50614 50610 491746 50609->50610 50766 42c964 50610->50766 50619 4917bd 50613->50619 50620 491800 50613->50620 50616 447008 18 API calls 50614->50616 50618 491780 50616->50618 50621 447008 18 API calls 50618->50621 50622 447008 18 API calls 50619->50622 50626 49180f 50620->50626 50627 491873 50620->50627 50623 491791 50621->50623 50624 4917d0 50622->50624 50772 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50623->50772 50628 447008 18 API calls 50624->50628 50630 447008 18 API calls 50626->50630 50635 4918b2 50627->50635 50636 491882 50627->50636 50631 4917e1 50628->50631 50629 49179d 50773 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50629->50773 50633 49181c 50630->50633 50774 491340 12 API calls 50631->50774 50702 42c618 7 API calls 50633->50702 50647 4918f1 50635->50647 50648 4918c1 50635->50648 50639 447008 18 API calls 50636->50639 50638 4917ef 50775 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50638->50775 50642 49188f 50639->50642 50640 49182a 50643 49182e 50640->50643 50644 491863 50640->50644 50778 4528f4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 50642->50778 50646 447008 18 API calls 50643->50646 50777 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50644->50777 50651 49183d 50646->50651 50656 491930 50647->50656 50657 491900 50647->50657 50652 447008 18 API calls 50648->50652 50650 49189c 50779 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50650->50779 50703 452c6c 50651->50703 50655 4918ce 50652->50655 50780 45275c 50655->50780 50666 491978 50656->50666 50667 49193f 50656->50667 50662 447008 18 API calls 50657->50662 50658 4918ad 50658->50589 50659 49184d 50776 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50659->50776 50661 4918db 50787 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50661->50787 50665 49190d 50662->50665 50788 452dfc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50665->50788 50674 4919c0 50666->50674 50675 491987 50666->50675 50669 447008 18 API calls 50667->50669 50671 49194e 50669->50671 50670 49191a 50789 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50670->50789 50673 447008 18 API calls 50671->50673 50676 49195f 50673->50676 50679 4919d3 50674->50679 50686 491a89 50674->50686 50677 447008 18 API calls 50675->50677 50682 447288 5 API calls 50676->50682 50678 491996 50677->50678 50680 447008 18 API calls 50678->50680 50683 447008 18 API calls 50679->50683 50681 4919a7 50680->50681 50687 447288 5 API calls 50681->50687 50682->50589 50684 491a00 50683->50684 50685 447008 18 API calls 50684->50685 50688 491a17 50685->50688 50686->50589 50793 446fac 18 API calls 50686->50793 50687->50589 50790 407de4 7 API calls 50688->50790 50690 491aa2 50794 42e8d8 FormatMessageA 50690->50794 50695 491a39 50696 447008 18 API calls 50695->50696 50697 491a4d 50696->50697 50791 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50697->50791 50699 491a58 50792 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50699->50792 50701 491a64 50702->50640 50799 452710 50703->50799 50705 452c89 50705->50659 50706 452c85 50706->50705 50707 452cad MoveFileA GetLastError 50706->50707 50805 45274c 50707->50805 50710->50589 50712 406bc7 50711->50712 50713 406be0 50712->50713 50715 406be9 50712->50715 50714 403400 4 API calls 50713->50714 50716 406be7 50714->50716 50808 403778 50715->50808 50718 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50716->50718 50718->50589 50719->50537 50720->50589 50721->50545 50722->50589 50723->50546 50724->50589 50726 403738 50725->50726 50727 4072ba SetCurrentDirectoryA 50726->50727 50727->50556 50728->50589 50730 403738 50729->50730 50731 42c837 GetFullPathNameA 50730->50731 50732 42c843 50731->50732 50733 42c85a 50731->50733 50732->50733 50735 42c84b 50732->50735 50734 403494 4 API calls 50733->50734 50737 42c858 50734->50737 50736 4034e0 4 API calls 50735->50736 50736->50737 50738 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50737->50738 50738->50589 50739->50570 50740->50589 50741->50583 50742->50589 50815 42c7ac 50743->50815 50746 403778 4 API calls 50747 42c8d5 50746->50747 50748 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50747->50748 50748->50589 50830 42c684 50749->50830 50752 42c8f0 50754 403400 4 API calls 50752->50754 50753 42c8f9 50755 403778 4 API calls 50753->50755 50756 42c8f7 50754->50756 50755->50756 50757 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50756->50757 50757->50589 50758->50602 50759->50589 50761 42c7ac IsDBCSLeadByte 50760->50761 50762 42c94c 50761->50762 50763 403778 4 API calls 50762->50763 50764 42c95e 50763->50764 50765 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50764->50765 50765->50589 50767 42c7ac IsDBCSLeadByte 50766->50767 50768 42c974 50767->50768 50769 403778 4 API calls 50768->50769 50770 42c985 50769->50770 50771 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50770->50771 50771->50589 50772->50629 50773->50589 50774->50638 50775->50589 50776->50589 50777->50589 50778->50650 50779->50658 50781 452710 2 API calls 50780->50781 50783 452772 50781->50783 50782 452776 50782->50661 50783->50782 50784 452794 CreateDirectoryA GetLastError 50783->50784 50785 45274c Wow64RevertWow64FsRedirection 50784->50785 50786 4527ba 50785->50786 50786->50661 50787->50589 50788->50670 50789->50589 50790->50695 50791->50699 50792->50701 50793->50690 50795 42e8fe 50794->50795 50796 4034e0 4 API calls 50795->50796 50797 42e91b 50796->50797 50798 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50797->50798 50798->50589 50800 45271e 50799->50800 50801 45271a 50799->50801 50802 452727 Wow64DisableWow64FsRedirection 50800->50802 50803 452740 SetLastError 50800->50803 50801->50706 50804 45273b 50802->50804 50803->50804 50804->50706 50806 452751 Wow64RevertWow64FsRedirection 50805->50806 50807 45275b 50805->50807 50806->50807 50807->50659 50809 4037aa 50808->50809 50810 40377d 50808->50810 50811 403400 4 API calls 50809->50811 50810->50809 50813 403791 50810->50813 50812 4037a0 50811->50812 50812->50716 50814 4034e0 4 API calls 50813->50814 50814->50812 50820 42c68c 50815->50820 50817 42c7c1 50818 42c80b 50817->50818 50827 42c454 IsDBCSLeadByte 50817->50827 50818->50746 50823 42c69d 50820->50823 50821 42c701 50824 42c6fc 50821->50824 50829 42c454 IsDBCSLeadByte 50821->50829 50823->50821 50825 42c6bb 50823->50825 50824->50817 50825->50824 50828 42c454 IsDBCSLeadByte 50825->50828 50827->50817 50828->50825 50829->50824 50831 42c68c IsDBCSLeadByte 50830->50831 50832 42c68b 50831->50832 50832->50752 50832->50753 50833 41364c SetWindowLongA GetWindowLongA 50834 4136a9 SetPropA SetPropA 50833->50834 50835 41368b GetWindowLongA 50833->50835 50839 41f3ac 50834->50839 50835->50834 50836 41369a SetWindowLongA 50835->50836 50836->50834 50844 415280 50839->50844 50851 423c1c 50839->50851 50945 423a94 50839->50945 50840 4136f9 50845 41528d 50844->50845 50846 4152f3 50845->50846 50847 4152e8 50845->50847 50849 4152f1 50845->50849 50952 424b9c 13 API calls 50846->50952 50847->50849 50953 41506c 46 API calls 50847->50953 50849->50840 50856 423c52 50851->50856 50854 423cfc 50857 423d03 50854->50857 50858 423d37 50854->50858 50855 423c9d 50859 423ca3 50855->50859 50860 423d60 50855->50860 50870 423c73 50856->50870 50954 423b78 50856->50954 50861 423d09 50857->50861 50904 423fc1 50857->50904 50864 423d42 50858->50864 50865 4240aa IsIconic 50858->50865 50862 423cd5 50859->50862 50863 423ca8 50859->50863 50866 423d72 50860->50866 50867 423d7b 50860->50867 50868 423f23 SendMessageA 50861->50868 50869 423d17 50861->50869 50862->50870 50894 423cee 50862->50894 50895 423e4f 50862->50895 50872 423e06 50863->50872 50873 423cae 50863->50873 50874 4240e6 50864->50874 50875 423d4b 50864->50875 50865->50870 50871 4240be GetFocus 50865->50871 50876 423d88 50866->50876 50877 423d79 50866->50877 50963 4241a4 11 API calls 50867->50963 50868->50870 50869->50870 50896 423cd0 50869->50896 50925 423f66 50869->50925 50870->50840 50871->50870 50882 4240cf 50871->50882 50976 423b94 NtdllDefWindowProc_A 50872->50976 50883 423cb7 50873->50883 50884 423e2e PostMessageA 50873->50884 50998 424860 WinHelpA PostMessageA 50874->50998 50880 4240fd 50875->50880 50875->50896 50964 4241ec IsIconic 50876->50964 50972 423b94 NtdllDefWindowProc_A 50877->50972 50892 424106 50880->50892 50893 42411b 50880->50893 50997 41f004 GetCurrentThreadId 73EA5940 50882->50997 50889 423cc0 50883->50889 50890 423eb5 50883->50890 50982 423b94 NtdllDefWindowProc_A 50884->50982 50899 423cc9 50889->50899 50900 423dde IsIconic 50889->50900 50901 423ebe 50890->50901 50902 423eef 50890->50902 50891 423e49 50891->50870 50999 4244e4 50892->50999 51005 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 50893->51005 50894->50896 50905 423e1b 50894->50905 50958 423b94 NtdllDefWindowProc_A 50895->50958 50896->50870 50962 423b94 NtdllDefWindowProc_A 50896->50962 50898 4240d6 50898->50870 50913 4240de SetFocus 50898->50913 50899->50896 50914 423da1 50899->50914 50907 423dfa 50900->50907 50908 423dee 50900->50908 50984 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50901->50984 50959 423b94 NtdllDefWindowProc_A 50902->50959 50904->50870 50916 423fe7 IsWindowEnabled 50904->50916 50977 424188 50905->50977 50975 423b94 NtdllDefWindowProc_A 50907->50975 50974 423bd0 15 API calls 50908->50974 50912 423e55 50920 423e93 50912->50920 50921 423e71 50912->50921 50913->50870 50914->50870 50973 422c5c ShowWindow PostMessageA PostQuitMessage 50914->50973 50916->50870 50923 423ff5 50916->50923 50919 423ef5 50924 423f0d 50919->50924 50960 41eeb4 GetCurrentThreadId 73EA5940 50919->50960 50927 423a94 6 API calls 50920->50927 50983 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50921->50983 50922 423ec6 50929 423ed8 50922->50929 50985 41ef68 50922->50985 50937 423ffc IsWindowVisible 50923->50937 50932 423a94 6 API calls 50924->50932 50925->50870 50933 423f88 IsWindowEnabled 50925->50933 50935 423e9b PostMessageA 50927->50935 50991 423b94 NtdllDefWindowProc_A 50929->50991 50932->50870 50933->50870 50938 423f96 50933->50938 50934 423e79 PostMessageA 50934->50870 50935->50870 50937->50870 50939 42400a GetFocus 50937->50939 50992 412320 7 API calls 50938->50992 50993 4181f0 50939->50993 50942 42401f SetFocus 50995 415250 50942->50995 50946 423b1d 50945->50946 50947 423aa4 50945->50947 50946->50840 50947->50946 50948 423aaa EnumWindows 50947->50948 50948->50946 50949 423ac6 GetWindow GetWindowLongA 50948->50949 51109 423a2c GetWindow 50948->51109 50950 423ae5 50949->50950 50950->50946 50951 423b11 SetWindowPos 50950->50951 50951->50946 50951->50950 50952->50849 50953->50849 50955 423b82 50954->50955 50956 423b8d 50954->50956 50955->50956 51006 408728 GetSystemDefaultLCID 50955->51006 50956->50854 50956->50855 50958->50912 50959->50919 50961 41ef39 50960->50961 50961->50924 50962->50870 50963->50870 50965 424233 50964->50965 50966 4241fd SetActiveWindow 50964->50966 50965->50870 51081 42365c 50966->51081 50970 42421a 50970->50965 50971 42422d SetFocus 50970->50971 50971->50965 50972->50870 50973->50870 50974->50870 50975->50870 50976->50870 51094 41db40 50977->51094 50980 4241a0 50980->50870 50981 424194 LoadIconA 50981->50980 50982->50891 50983->50934 50984->50922 50986 41ef70 IsWindow 50985->50986 50987 41ef9c 50985->50987 50988 41ef8a 50986->50988 50989 41ef7f EnableWindow 50986->50989 50987->50929 50988->50986 50988->50987 50990 402660 4 API calls 50988->50990 50989->50988 50990->50988 50991->50870 50992->50870 50994 4181fa 50993->50994 50994->50942 50996 41526b SetFocus 50995->50996 50996->50870 50997->50898 50998->50891 51000 4244f0 50999->51000 51001 42450a 50999->51001 51002 4244f7 SendMessageA 51000->51002 51004 42451f 51000->51004 51003 402648 4 API calls 51001->51003 51002->51004 51003->51004 51004->50870 51005->50891 51061 408570 GetLocaleInfoA 51006->51061 51011 408570 5 API calls 51012 40877d 51011->51012 51013 408570 5 API calls 51012->51013 51014 4087a1 51013->51014 51073 4085bc GetLocaleInfoA 51014->51073 51017 4085bc GetLocaleInfoA 51018 4087d1 51017->51018 51019 408570 5 API calls 51018->51019 51020 4087eb 51019->51020 51021 4085bc GetLocaleInfoA 51020->51021 51022 408808 51021->51022 51023 408570 5 API calls 51022->51023 51024 408822 51023->51024 51025 403450 4 API calls 51024->51025 51026 40882f 51025->51026 51027 408570 5 API calls 51026->51027 51028 408844 51027->51028 51029 403450 4 API calls 51028->51029 51030 408851 51029->51030 51031 4085bc GetLocaleInfoA 51030->51031 51032 40885f 51031->51032 51033 408570 5 API calls 51032->51033 51034 408879 51033->51034 51035 403450 4 API calls 51034->51035 51036 408886 51035->51036 51037 408570 5 API calls 51036->51037 51038 40889b 51037->51038 51039 403450 4 API calls 51038->51039 51040 4088a8 51039->51040 51041 408570 5 API calls 51040->51041 51042 4088bd 51041->51042 51043 4088da 51042->51043 51044 4088cb 51042->51044 51062 408597 51061->51062 51063 4085a9 51061->51063 51064 4034e0 4 API calls 51062->51064 51065 403494 4 API calls 51063->51065 51066 4085a7 51064->51066 51065->51066 51067 403450 51066->51067 51068 403454 51067->51068 51071 403464 51067->51071 51070 4034bc 4 API calls 51068->51070 51068->51071 51069 403490 51069->51011 51070->51071 51071->51069 51072 402660 4 API calls 51071->51072 51072->51069 51074 4085d8 51073->51074 51074->51017 51090 423608 SystemParametersInfoA 51081->51090 51084 423675 ShowWindow 51086 423680 51084->51086 51087 423687 51084->51087 51093 423638 SystemParametersInfoA 51086->51093 51089 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 51087->51089 51089->50970 51091 423626 51090->51091 51091->51084 51092 423638 SystemParametersInfoA 51091->51092 51092->51084 51093->51087 51097 41db64 51094->51097 51098 41db71 51097->51098 51103 41db4a 51097->51103 51098->51103 51106 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51098->51106 51100 41db8e 51101 41dba8 51100->51101 51102 41db9b 51100->51102 51100->51103 51107 41bd9c 11 API calls 51101->51107 51108 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51102->51108 51103->50980 51103->50981 51106->51100 51107->51103 51108->51103 51110 423a4d GetWindowLongA 51109->51110 51111 423a59 51109->51111 51110->51111 51112 4804c6 51113 4804cf 51112->51113 51114 4804fa 51112->51114 51113->51114 51115 4804ec 51113->51115 51117 480539 51114->51117 51552 47efb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51114->51552 51550 476b6c 188 API calls 51115->51550 51118 48055d 51117->51118 51122 480550 51117->51122 51123 480552 51117->51123 51125 480599 51118->51125 51126 48057b 51118->51126 51120 4804f1 51120->51114 51551 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51120->51551 51121 48052c 51553 47f018 42 API calls 51121->51553 51129 47eff4 42 API calls 51122->51129 51554 47f088 42 API calls 51123->51554 51557 47ee48 24 API calls 51125->51557 51130 480590 51126->51130 51555 47f018 42 API calls 51126->51555 51129->51118 51556 47ee48 24 API calls 51130->51556 51132 480597 51135 4805a9 51132->51135 51136 4805af 51132->51136 51137 4805ad 51135->51137 51238 47eff4 51135->51238 51136->51137 51138 47eff4 42 API calls 51136->51138 51243 47c3a4 51137->51243 51138->51137 51625 47eadc 42 API calls 51238->51625 51240 47f00f 51626 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51240->51626 51627 42d8a8 GetWindowsDirectoryA 51243->51627 51245 47c3c2 51246 403450 4 API calls 51245->51246 51247 47c3cf 51246->51247 51629 42d8d4 GetSystemDirectoryA 51247->51629 51249 47c3d7 51250 403450 4 API calls 51249->51250 51251 47c3e4 51250->51251 51631 42d900 51251->51631 51253 47c3ec 51254 403450 4 API calls 51253->51254 51255 47c3f9 51254->51255 51256 47c402 51255->51256 51257 47c41e 51255->51257 51687 42d218 51256->51687 51258 403400 4 API calls 51257->51258 51260 47c41c 51258->51260 51262 47c463 51260->51262 51264 42c8dc 5 API calls 51260->51264 51635 47c22c 51262->51635 51263 403450 4 API calls 51263->51260 51266 47c43e 51264->51266 51268 403450 4 API calls 51266->51268 51270 47c44b 51268->51270 51269 403450 4 API calls 51271 47c47f 51269->51271 51270->51262 51275 403450 4 API calls 51270->51275 51272 47c49d 51271->51272 51273 4035c0 4 API calls 51271->51273 51274 47c22c 8 API calls 51272->51274 51273->51272 51276 47c4ac 51274->51276 51275->51262 51277 403450 4 API calls 51276->51277 51278 47c4b9 51277->51278 51279 47c4e1 51278->51279 51280 42c40c 5 API calls 51278->51280 51281 47c548 51279->51281 51285 47c22c 8 API calls 51279->51285 51282 47c4cf 51280->51282 51283 47c572 51281->51283 51284 47c551 51281->51284 51287 4035c0 4 API calls 51282->51287 51646 42c40c 51283->51646 51288 42c40c 5 API calls 51284->51288 51289 47c4f9 51285->51289 51287->51279 51292 403450 4 API calls 51289->51292 51550->51120 51552->51121 51553->51117 51554->51118 51555->51130 51556->51132 51557->51132 51625->51240 51628 42d8c9 51627->51628 51628->51245 51630 42d8f5 51629->51630 51630->51249 51632 403400 4 API calls 51631->51632 51633 42d910 GetModuleHandleA GetProcAddress 51632->51633 51634 42d929 51633->51634 51634->51253 51697 42de2c 51635->51697 51637 47c252 51638 47c256 51637->51638 51639 47c278 51637->51639 51700 42dd5c 51638->51700 51640 403400 4 API calls 51639->51640 51642 47c27f 51640->51642 51642->51269 51644 47c26d RegCloseKey 51644->51642 51645 403400 4 API calls 51645->51644 51688 4038a4 4 API calls 51687->51688 51689 42d22b 51688->51689 51690 42d242 GetEnvironmentVariableA 51689->51690 51694 42d255 51689->51694 51735 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51689->51735 51690->51689 51691 42d24e 51690->51691 51693 403400 4 API calls 51691->51693 51693->51694 51694->51263 51698 42de37 51697->51698 51699 42de3d RegOpenKeyExA 51697->51699 51698->51699 51699->51637 51703 42dc10 51700->51703 51704 42dc36 RegQueryValueExA 51703->51704 51705 42dc7b 51704->51705 51710 42dc59 51704->51710 51706 403400 4 API calls 51705->51706 51707 42dd47 51706->51707 51707->51644 51707->51645 51708 42dc73 51709 403400 4 API calls 51708->51709 51709->51705 51710->51705 51710->51708 51711 4034e0 4 API calls 51710->51711 51720 403744 51710->51720 51711->51710 51713 42dcb0 RegQueryValueExA 51713->51704 51714 42dccc 51713->51714 51714->51705 51724 4038a4 51714->51724 51717 42dd20 51719 403744 4 API calls 51719->51717 51721 40374a 51720->51721 51723 40375b 51720->51723 51722 4034bc 4 API calls 51721->51722 51721->51723 51722->51723 51723->51713 51725 4038b1 51724->51725 51732 4038e1 51724->51732 51727 4038da 51725->51727 51729 4038bd 51725->51729 51726 403400 4 API calls 51728 4038cb 51726->51728 51730 4034bc 4 API calls 51727->51730 51728->51717 51728->51719 51733 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51729->51733 51730->51732 51732->51726 51733->51728 51735->51689 53796 46be48 53797 46be7c 53796->53797 53831 46c254 53796->53831 53798 46beb8 53797->53798 53800 46bf14 53797->53800 53801 46bef2 53797->53801 53802 46bf03 53797->53802 53803 46bed0 53797->53803 53804 46bee1 53797->53804 53798->53831 53882 468fe0 53798->53882 53799 403400 4 API calls 53806 46c293 53799->53806 54114 46bdd8 45 API calls 53800->54114 53847 46ba08 53801->53847 54113 46bbc8 67 API calls 53802->54113 54111 46b758 47 API calls 53803->54111 54112 46b8c0 42 API calls 53804->54112 53807 403400 4 API calls 53806->53807 53813 46c29b 53807->53813 53814 46bed6 53814->53798 53814->53831 53815 46bf50 53816 494770 18 API calls 53815->53816 53818 46bf93 53815->53818 53815->53831 53816->53818 53819 46c0b6 53818->53819 53822 42cbd0 6 API calls 53818->53822 53824 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53818->53824 53826 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53818->53826 53827 46b2a0 23 API calls 53818->53827 53830 46c136 53818->53830 53818->53831 53834 46c18e 53818->53834 53843 46c17c 53818->53843 53885 468f1c 53818->53885 53893 46b00c 53818->53893 53900 46a26c 53818->53900 54038 482b0c 53818->54038 54124 46b514 19 API calls 53818->54124 54115 48300c 123 API calls 53819->54115 53822->53818 53823 46c0d1 53823->53831 53824->53818 53826->53818 53827->53818 53832 457d58 24 API calls 53830->53832 53831->53799 53835 46c155 53832->53835 53833 46b2a0 23 API calls 53833->53831 53961 46b2a0 53834->53961 53837 457d58 24 API calls 53835->53837 53837->53843 53838 46c19b 53839 46c1c4 SetActiveWindow 53838->53839 53840 46c1dc 53838->53840 53839->53840 53996 46a60c 53840->53996 53842 46c1ff 53842->53843 53844 46c21a 53842->53844 53843->53833 54116 46b11c 53844->54116 54125 46c6cc 53847->54125 53850 46bb8a 53851 403420 4 API calls 53850->53851 53853 46bba4 53851->53853 53855 403400 4 API calls 53853->53855 53854 46ba56 53880 46bb76 53854->53880 54132 455f70 13 API calls 53854->54132 53856 46bbac 53855->53856 53859 403400 4 API calls 53856->53859 53858 403450 4 API calls 53858->53850 53861 46bbb4 53859->53861 53860 46ba74 53881 46bad9 53860->53881 54133 46696c 53860->54133 53861->53798 53862 42cd58 7 API calls 53863 46bb12 53862->53863 53866 451444 4 API calls 53863->53866 53874 46bb39 53863->53874 53865 42cd58 7 API calls 53868 46bb4f 53865->53868 53869 46bb29 53866->53869 53873 451444 4 API calls 53868->53873 53868->53880 54138 47eadc 42 API calls 53869->54138 53870 46696c 19 API calls 53872 46bab4 53870->53872 53875 451414 4 API calls 53872->53875 53876 46bb66 53873->53876 53874->53850 53874->53865 53874->53880 53877 46bac9 53875->53877 54139 47eadc 42 API calls 53876->54139 54137 47eadc 42 API calls 53877->54137 53880->53850 53880->53858 53881->53850 53881->53862 53881->53874 53883 468f1c 19 API calls 53882->53883 53884 468fef 53883->53884 53884->53815 53888 468f4b 53885->53888 53886 4078fc 19 API calls 53887 468f84 53886->53887 54259 453330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53887->54259 53888->53886 53890 468f8c 53888->53890 53891 403400 4 API calls 53890->53891 53892 468fa4 53891->53892 53892->53818 53894 46b01d 53893->53894 53895 46b018 53893->53895 54345 469dec 46 API calls 53894->54345 53897 46b01b 53895->53897 54260 46aa78 53895->54260 53897->53818 53898 46b025 53898->53818 53901 403400 4 API calls 53900->53901 53902 46a299 53901->53902 54368 47d9bc 53902->54368 53904 46a2f8 53905 46a315 53904->53905 53906 46a2fc 53904->53906 53907 46a306 53905->53907 54378 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53905->54378 54375 466b6c 53906->54375 53911 46a434 53907->53911 53912 46a49f 53907->53912 53960 46a5a9 53907->53960 53910 46a331 53910->53907 53914 46a339 53910->53914 53915 403494 4 API calls 53911->53915 53916 403494 4 API calls 53912->53916 53913 403420 4 API calls 53917 46a5d3 53913->53917 53918 46b2a0 23 API calls 53914->53918 53919 46a441 53915->53919 53920 46a4ac 53916->53920 53917->53818 53928 46a346 53918->53928 53921 40357c 4 API calls 53919->53921 53922 40357c 4 API calls 53920->53922 53923 46a44e 53921->53923 53924 46a4b9 53922->53924 53925 40357c 4 API calls 53923->53925 53926 40357c 4 API calls 53924->53926 53929 46a45b 53925->53929 53927 46a4c6 53926->53927 53931 40357c 4 API calls 53927->53931 53934 46a387 53928->53934 53935 46a36f SetActiveWindow 53928->53935 53930 40357c 4 API calls 53929->53930 53932 46a468 53930->53932 53933 46a4d3 53931->53933 53936 466b6c 20 API calls 53932->53936 53937 40357c 4 API calls 53933->53937 54379 42f570 53934->54379 53935->53934 53938 46a476 53936->53938 53939 46a4e1 53937->53939 53940 40357c 4 API calls 53938->53940 53941 414b28 4 API calls 53939->53941 53944 46a47f 53940->53944 53951 46a49d 53941->53951 53946 40357c 4 API calls 53944->53946 53949 46a48c 53946->53949 53948 46a3d8 53952 46b11c 21 API calls 53948->53952 53950 414b28 4 API calls 53949->53950 53950->53951 54396 466ea4 53951->54396 53953 46a40a 53952->53953 53953->53818 53954 46a503 53955 414b28 4 API calls 53954->53955 53954->53960 53960->53913 53962 468fe0 19 API calls 53961->53962 53963 46b2b8 53962->53963 53964 46b2da 53963->53964 53965 465638 7 API calls 53963->53965 54515 465638 53964->54515 53965->53964 53969 46b2f2 53970 46b11c 21 API calls 53969->53970 53971 46b32a 53970->53971 53972 414b28 4 API calls 53971->53972 53973 46b33e 53972->53973 53974 46b374 53973->53974 53975 46b34a 53973->53975 53978 46b393 53974->53978 53979 46b3bd 53974->53979 53976 414b28 4 API calls 53975->53976 53977 46b35e 53976->53977 53981 414b28 4 API calls 53977->53981 53982 414b28 4 API calls 53978->53982 53980 414b28 4 API calls 53979->53980 53984 46b3d1 53980->53984 53985 46b372 53981->53985 53983 46b3a7 53982->53983 53986 414b28 4 API calls 53983->53986 53987 414b28 4 API calls 53984->53987 54532 46b034 53985->54532 53986->53985 53987->53985 53990 468fe0 19 API calls 53994 46b46f 53990->53994 53992 46b40f 53992->53990 53993 46b4d2 53993->53838 53994->53993 54537 4946bc 18 API calls 53994->54537 53998 46a637 53996->53998 53997 46a66e 54000 46a7e3 53997->54000 54018 46a682 53997->54018 53998->53997 54557 47dc30 53998->54557 54002 46a817 54000->54002 54009 46a801 54000->54009 54037 46a95a 54000->54037 54001 403400 4 API calls 54004 46a97f 54001->54004 54003 414b28 4 API calls 54002->54003 54010 46a815 54003->54010 54004->53842 54005 46a7c0 54006 46a7db 54005->54006 54011 402660 4 API calls 54005->54011 54006->53842 54007 402660 4 API calls 54007->54018 54008 402648 4 API calls 54008->54018 54013 414b28 4 API calls 54009->54013 54569 495520 MulDiv 54010->54569 54011->54006 54012 46a78c 54015 457d58 24 API calls 54012->54015 54013->54010 54015->54005 54016 46a838 54020 466ea4 11 API calls 54016->54020 54018->54007 54018->54008 54022 46a6f5 54018->54022 54019 457d58 24 API calls 54019->54022 54021 46a86c 54020->54021 54022->54005 54022->54012 54022->54019 54024 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54022->54024 54568 403ba4 7 API calls 54022->54568 54024->54022 54037->54001 54039 46c6cc 48 API calls 54038->54039 54040 482b4f 54039->54040 54041 482b58 54040->54041 54785 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54040->54785 54043 414af8 4 API calls 54041->54043 54044 482b68 54043->54044 54045 403450 4 API calls 54044->54045 54046 482b75 54045->54046 54595 46ca24 54046->54595 54049 482b85 54051 414af8 4 API calls 54049->54051 54052 482b95 54051->54052 54053 403450 4 API calls 54052->54053 54054 482ba2 54053->54054 54055 469bd4 SendMessageA 54054->54055 54056 482bbb 54055->54056 54057 482c0c 54056->54057 54787 479c64 23 API calls 54056->54787 54058 4241ec 11 API calls 54057->54058 54060 482c16 54058->54060 54061 482c3c 54060->54061 54062 482c27 SetActiveWindow 54060->54062 54624 481f3c 54061->54624 54062->54061 54111->53814 54112->53798 54113->53798 54114->53798 54115->53823 54117 468f1c 19 API calls 54116->54117 54124->53818 54140 46c764 54125->54140 54128 414af8 54129 414b06 54128->54129 54130 4034e0 4 API calls 54129->54130 54131 414b13 54130->54131 54131->53854 54132->53860 54134 466986 54133->54134 54135 4078fc 19 API calls 54134->54135 54136 4669c1 54135->54136 54136->53870 54137->53881 54138->53874 54139->53880 54141 414af8 4 API calls 54140->54141 54142 46c798 54141->54142 54201 466c04 54142->54201 54146 46c7aa 54147 46c7b9 54146->54147 54149 46c7d2 54146->54149 54235 47eadc 42 API calls 54147->54235 54152 46c819 54149->54152 54154 46c800 54149->54154 54150 403420 4 API calls 54151 46ba3a 54150->54151 54151->53850 54151->54128 54153 46c87e 54152->54153 54159 46c81d 54152->54159 54238 42cb5c CharNextA 54153->54238 54236 47eadc 42 API calls 54154->54236 54157 46c88d 54158 46c891 54157->54158 54163 46c8aa 54157->54163 54239 47eadc 42 API calls 54158->54239 54161 46c865 54159->54161 54159->54163 54237 47eadc 42 API calls 54161->54237 54164 46c8ce 54163->54164 54215 466d74 54163->54215 54240 47eadc 42 API calls 54164->54240 54167 46c7cd 54167->54150 54171 46c8e7 54172 403778 4 API calls 54171->54172 54173 46c8fd 54172->54173 54223 42c9ac 54173->54223 54176 46c90e 54241 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54176->54241 54177 46c93f 54178 42c8dc 5 API calls 54177->54178 54180 46c94a 54178->54180 54182 42c40c 5 API calls 54180->54182 54181 46c921 54183 451444 4 API calls 54181->54183 54184 46c955 54182->54184 54185 46c92e 54183->54185 54186 42cbd0 6 API calls 54184->54186 54242 47eadc 42 API calls 54185->54242 54188 46c960 54186->54188 54227 46c6f8 54188->54227 54190 46c968 54191 42cd58 7 API calls 54190->54191 54192 46c970 54191->54192 54193 46c974 54192->54193 54194 46c98a 54192->54194 54243 47eadc 42 API calls 54193->54243 54194->54167 54196 46c994 54194->54196 54197 46c99c GetDriveTypeA 54196->54197 54197->54167 54206 466c1e 54201->54206 54202 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54202->54206 54204 42cbd0 6 API calls 54204->54206 54205 403450 4 API calls 54205->54206 54206->54202 54206->54204 54206->54205 54207 466c67 54206->54207 54245 42cabc 54206->54245 54208 403420 4 API calls 54207->54208 54209 466c81 54208->54209 54210 414b28 54209->54210 54211 414af8 4 API calls 54210->54211 54212 414b4c 54211->54212 54213 403400 4 API calls 54212->54213 54214 414b7d 54213->54214 54214->54146 54216 466d7e 54215->54216 54217 466d91 54216->54217 54256 42cb4c CharNextA 54216->54256 54217->54164 54219 466da4 54217->54219 54220 466dae 54219->54220 54221 466ddb 54220->54221 54257 42cb4c CharNextA 54220->54257 54221->54164 54221->54171 54224 42ca05 54223->54224 54225 42c9c2 54223->54225 54224->54176 54224->54177 54225->54224 54258 42cb4c CharNextA 54225->54258 54228 46c75d 54227->54228 54229 46c70b 54227->54229 54228->54190 54229->54228 54230 41eeb4 2 API calls 54229->54230 54231 46c71b 54230->54231 54232 46c735 SHPathPrepareForWriteA 54231->54232 54233 41ef68 6 API calls 54232->54233 54234 46c755 54233->54234 54234->54190 54235->54167 54236->54167 54237->54167 54238->54157 54239->54167 54240->54167 54241->54181 54242->54167 54243->54167 54246 403494 4 API calls 54245->54246 54249 42cacc 54246->54249 54247 403744 4 API calls 54247->54249 54249->54247 54251 42cb02 54249->54251 54254 42c454 IsDBCSLeadByte 54249->54254 54250 42cb46 54250->54206 54251->54250 54253 4037b8 4 API calls 54251->54253 54255 42c454 IsDBCSLeadByte 54251->54255 54253->54251 54254->54249 54255->54251 54256->54216 54257->54220 54258->54225 54259->53890 54262 46aabf 54260->54262 54261 46af37 54263 46af52 54261->54263 54264 46af83 54261->54264 54262->54261 54265 46ab7a 54262->54265 54269 403494 4 API calls 54262->54269 54268 403494 4 API calls 54263->54268 54266 403494 4 API calls 54264->54266 54267 46ab9b 54265->54267 54271 46abdc 54265->54271 54270 46af91 54266->54270 54272 403494 4 API calls 54267->54272 54273 46af60 54268->54273 54274 46aafe 54269->54274 54364 4694c8 12 API calls 54270->54364 54275 403400 4 API calls 54271->54275 54277 46aba9 54272->54277 54363 4694c8 12 API calls 54273->54363 54279 414af8 4 API calls 54274->54279 54280 46abda 54275->54280 54281 414af8 4 API calls 54277->54281 54283 46ab1f 54279->54283 54303 46acc0 54280->54303 54346 469bd4 54280->54346 54285 46abca 54281->54285 54282 46af6e 54284 403400 4 API calls 54282->54284 54286 403634 4 API calls 54283->54286 54288 46afb4 54284->54288 54290 403634 4 API calls 54285->54290 54291 46ab2f 54286->54291 54295 403400 4 API calls 54288->54295 54289 46ad48 54293 403400 4 API calls 54289->54293 54290->54280 54292 414af8 4 API calls 54291->54292 54296 46ab43 54292->54296 54297 46ad46 54293->54297 54294 46abfc 54298 46ac02 54294->54298 54299 46ac3a 54294->54299 54300 46afbc 54295->54300 54296->54265 54305 414af8 4 API calls 54296->54305 54358 46a010 43 API calls 54297->54358 54301 403494 4 API calls 54298->54301 54304 403400 4 API calls 54299->54304 54302 403420 4 API calls 54300->54302 54306 46ac10 54301->54306 54307 46afc9 54302->54307 54303->54289 54308 46ad07 54303->54308 54309 46ac38 54304->54309 54310 46ab6a 54305->54310 54312 47bfd8 43 API calls 54306->54312 54307->53897 54313 403494 4 API calls 54308->54313 54352 469ec8 54309->54352 54314 403634 4 API calls 54310->54314 54316 46ac28 54312->54316 54317 46ad15 54313->54317 54314->54265 54315 46ad71 54324 46add2 54315->54324 54325 46ad7c 54315->54325 54319 403634 4 API calls 54316->54319 54320 414af8 4 API calls 54317->54320 54319->54309 54321 46ad36 54320->54321 54323 403634 4 API calls 54321->54323 54322 46ac61 54328 46acc2 54322->54328 54329 46ac6c 54322->54329 54323->54297 54326 403400 4 API calls 54324->54326 54327 403494 4 API calls 54325->54327 54330 46adda 54326->54330 54331 46ad8a 54327->54331 54332 403400 4 API calls 54328->54332 54333 403494 4 API calls 54329->54333 54335 46add0 54330->54335 54344 46ae83 54330->54344 54331->54330 54331->54335 54339 403634 4 API calls 54331->54339 54332->54303 54334 46ac7a 54333->54334 54334->54303 54340 403634 4 API calls 54334->54340 54335->54330 54359 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54335->54359 54337 46adfd 54337->54344 54360 49490c 18 API calls 54337->54360 54339->54331 54340->54334 54342 46af24 54362 429154 SendMessageA SendMessageA 54342->54362 54361 429104 SendMessageA 54344->54361 54345->53898 54365 42a050 SendMessageA 54346->54365 54348 469be3 54349 469c03 54348->54349 54366 42a050 SendMessageA 54348->54366 54349->54294 54351 469bf3 54351->54294 54356 469ef5 54352->54356 54353 469f57 54354 403400 4 API calls 54353->54354 54355 469f6c 54354->54355 54355->54322 54356->54353 54367 469e4c 43 API calls 54356->54367 54358->54315 54359->54337 54360->54344 54361->54342 54362->54261 54363->54282 54364->54282 54365->54348 54366->54351 54367->54356 54369 47d9cf 54368->54369 54372 47da0c 54368->54372 54400 455cf8 54369->54400 54372->53904 54374 47da1f 54374->53904 54455 466a80 54375->54455 54378->53910 54380 42f57c 54379->54380 54381 42f59f GetActiveWindow GetFocus 54380->54381 54382 41eeb4 2 API calls 54381->54382 54383 42f5b6 54382->54383 54384 42f5d3 54383->54384 54385 42f5c3 RegisterClassA 54383->54385 54386 42f662 SetFocus 54384->54386 54387 42f5e1 CreateWindowExA 54384->54387 54385->54384 54389 403400 4 API calls 54386->54389 54387->54386 54388 42f614 54387->54388 54476 42428c 54388->54476 54391 42f67e 54389->54391 54395 49490c 18 API calls 54391->54395 54392 42f63c 54393 42f644 CreateWindowExA 54392->54393 54393->54386 54394 42f65a ShowWindow 54393->54394 54394->54386 54395->53948 54482 44b524 54396->54482 54398 466eab 54398->53954 54401 455d09 54400->54401 54402 455d16 54401->54402 54403 455d0d 54401->54403 54434 455adc 29 API calls 54402->54434 54426 4559fc 54403->54426 54406 455d13 54406->54372 54407 47d628 54406->54407 54413 47d726 54407->54413 54416 47d665 54407->54416 54408 47d6c9 54409 403420 4 API calls 54408->54409 54410 47d80e 54409->54410 54410->54374 54411 47954c 19 API calls 54411->54413 54413->54408 54413->54411 54420 47d77c 54413->54420 54414 4797f0 4 API calls 54414->54416 54415 47bfd8 43 API calls 54415->54420 54416->54408 54416->54413 54416->54414 54419 47bfd8 43 API calls 54416->54419 54424 47d6d2 54416->54424 54443 47968c 54416->54443 54417 47bfd8 43 API calls 54417->54424 54418 4540ec 20 API calls 54418->54420 54419->54416 54420->54413 54420->54415 54420->54418 54422 47d713 54420->54422 54421 42c93c 5 API calls 54421->54424 54422->54408 54423 42c964 5 API calls 54423->54424 54424->54416 54424->54417 54424->54421 54424->54422 54424->54423 54454 47d334 52 API calls 54424->54454 54427 42de2c RegOpenKeyExA 54426->54427 54428 455a19 54427->54428 54429 455a67 54428->54429 54435 455930 54428->54435 54429->54406 54432 455930 6 API calls 54433 455a48 RegCloseKey 54432->54433 54433->54406 54434->54406 54440 42dd68 54435->54440 54437 403420 4 API calls 54438 4559e2 54437->54438 54438->54432 54439 455958 54439->54437 54441 42dc10 6 API calls 54440->54441 54442 42dd71 54441->54442 54442->54439 54444 4796a2 54443->54444 54445 47969e 54443->54445 54446 403450 4 API calls 54444->54446 54445->54416 54447 4796af 54446->54447 54448 4796b5 54447->54448 54449 4796cf 54447->54449 54450 47954c 19 API calls 54448->54450 54451 47954c 19 API calls 54449->54451 54452 4796cb 54450->54452 54451->54452 54453 403400 4 API calls 54452->54453 54453->54445 54454->54424 54456 403494 4 API calls 54455->54456 54457 466aae 54456->54457 54458 42dbd8 5 API calls 54457->54458 54459 466ac0 54458->54459 54460 42dbd8 5 API calls 54459->54460 54461 466ad2 54460->54461 54462 46696c 19 API calls 54461->54462 54463 466adc 54462->54463 54464 42dbd8 5 API calls 54463->54464 54465 466aeb 54464->54465 54472 4669e4 54465->54472 54468 42dbd8 5 API calls 54469 466b04 54468->54469 54470 403400 4 API calls 54469->54470 54471 466b19 54470->54471 54471->53907 54474 466a04 54472->54474 54473 4078fc 19 API calls 54475 466a4e 54473->54475 54474->54473 54475->54468 54477 4242be 54476->54477 54478 42429e GetWindowTextA 54476->54478 54480 403494 4 API calls 54477->54480 54479 4034e0 4 API calls 54478->54479 54481 4242bc 54479->54481 54480->54481 54481->54392 54485 44b39c 54482->54485 54484 44b537 54484->54398 54486 44b3cf 54485->54486 54487 414af8 4 API calls 54486->54487 54490 44b3e2 54487->54490 54488 44b40f 73E9A570 54496 41a1f8 54488->54496 54489 40357c 4 API calls 54489->54488 54490->54488 54490->54489 54493 44b440 54504 44b0d0 54493->54504 54495 44b454 73E9A480 54495->54484 54497 41a223 54496->54497 54498 41a2bf 54496->54498 54501 403520 4 API calls 54497->54501 54499 403400 4 API calls 54498->54499 54500 41a2d7 SelectObject 54499->54500 54500->54493 54502 41a27b 54501->54502 54503 41a2b3 CreateFontIndirectA 54502->54503 54503->54498 54505 44b0e7 54504->54505 54506 44b17a 54505->54506 54507 44b163 54505->54507 54508 44b0fa 54505->54508 54506->54495 54509 44b173 DrawTextA 54507->54509 54508->54506 54510 402648 4 API calls 54508->54510 54509->54506 54511 44b10b 54510->54511 54512 44b129 MultiByteToWideChar DrawTextW 54511->54512 54513 402660 4 API calls 54512->54513 54514 44b15b 54513->54514 54514->54495 54518 465643 54515->54518 54516 46571e 54526 4673f8 54516->54526 54517 4656d6 54517->54516 54544 4185c8 7 API calls 54517->54544 54518->54516 54521 465693 54518->54521 54538 421a2c 54518->54538 54521->54517 54522 4656cd 54521->54522 54523 4656d8 54521->54523 54525 421a2c 7 API calls 54522->54525 54524 421a2c 7 API calls 54523->54524 54524->54517 54525->54517 54527 467428 54526->54527 54528 467409 54526->54528 54527->53969 54529 414b28 4 API calls 54528->54529 54530 467417 54529->54530 54531 414b28 4 API calls 54530->54531 54531->54527 54534 46b041 54532->54534 54533 421a2c 7 API calls 54535 46b0cc 54533->54535 54534->54533 54535->53992 54536 466ecc 18 API calls 54535->54536 54536->53992 54537->53993 54539 421a84 54538->54539 54541 421a3a 54538->54541 54539->54521 54540 421a69 54540->54539 54553 421d38 SetFocus GetFocus 54540->54553 54541->54540 54545 408cc4 54541->54545 54544->54516 54546 408cd0 54545->54546 54554 406df4 LoadStringA 54546->54554 54549 403450 4 API calls 54550 408d01 54549->54550 54551 403400 4 API calls 54550->54551 54552 408d16 54551->54552 54552->54540 54553->54539 54555 4034e0 4 API calls 54554->54555 54556 406e21 54555->54556 54556->54549 54558 402648 4 API calls 54557->54558 54559 47dc4c 54558->54559 54560 47d628 61 API calls 54559->54560 54561 47dc6b 54560->54561 54567 47dc7f 54561->54567 54573 47da48 54561->54573 54563 47dcab 54564 402660 4 API calls 54563->54564 54566 47dcb5 54564->54566 54565 402660 4 API calls 54565->54567 54566->53997 54567->54563 54567->54565 54568->54022 54569->54016 54574 403494 4 API calls 54573->54574 54584 47da75 54574->54584 54596 46ca4d 54595->54596 54597 414af8 4 API calls 54596->54597 54607 46ca9a 54596->54607 54598 46ca63 54597->54598 54794 466c90 6 API calls 54598->54794 54599 403420 4 API calls 54601 46cb44 54599->54601 54601->54049 54786 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54601->54786 54602 46ca6b 54603 414b28 4 API calls 54602->54603 54604 46ca79 54603->54604 54605 46ca86 54604->54605 54609 46ca9f 54604->54609 54795 47eadc 42 API calls 54605->54795 54607->54599 54608 46cab7 54796 47eadc 42 API calls 54608->54796 54609->54608 54611 466d74 CharNextA 54609->54611 54612 46cab3 54611->54612 54612->54608 54613 46cacd 54612->54613 54614 46cad3 54613->54614 54615 46cae9 54613->54615 54797 47eadc 42 API calls 54614->54797 54617 42c9ac CharNextA 54615->54617 54618 46caf6 54617->54618 54618->54607 54798 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54618->54798 54620 46cb0d 54621 451444 4 API calls 54620->54621 54622 46cb1a 54621->54622 54799 47eadc 42 API calls 54622->54799 54625 481f5f 54624->54625 54627 481f8d 54624->54627 54800 4946bc 18 API calls 54625->54800 54628 475dbc 54627->54628 54629 457b4c 24 API calls 54628->54629 54630 475e08 54629->54630 54631 4072b0 SetCurrentDirectoryA 54630->54631 54632 475e12 54631->54632 54801 46e5b0 54632->54801 54636 475e22 54787->54057 54794->54602 54795->54607 54796->54607 54797->54607 54798->54620 54799->54607 54800->54627 54802 46e623 54801->54802 54804 46e5cd 54801->54804 54805 46e628 54802->54805 54803 47968c 19 API calls 54803->54804 54804->54802 54804->54803 54806 46e64e 54805->54806 55249 44fb08 54806->55249 54808 46e6aa 54808->54636 55252 44fb1c 55249->55252 55253 44fb2d 55252->55253 55254 44fb19 55253->55254 55255 44fb57 MulDiv 55253->55255 55254->54808 55256 4181f0 55255->55256 56669 498578 56727 403344 56669->56727 56671 498586 56730 4056a0 56671->56730 56673 49858b 56733 406334 GetModuleHandleA GetProcAddress 56673->56733 56679 49859a 56750 410964 56679->56750 56681 49859f 56754 412938 56681->56754 56683 4985a9 56759 419050 GetVersion 56683->56759 57000 4032fc 56727->57000 56729 403349 GetModuleHandleA GetCommandLineA 56729->56671 56732 4056db 56730->56732 57001 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56730->57001 56732->56673 56734 406350 56733->56734 56735 406357 GetProcAddress 56733->56735 56734->56735 56736 406366 56735->56736 56737 40636d GetProcAddress 56735->56737 56736->56737 56738 406380 56737->56738 56739 40637c SetProcessDEPPolicy 56737->56739 56740 409954 56738->56740 56739->56738 57002 40902c 56740->57002 56745 408728 7 API calls 56746 409977 56745->56746 57017 409078 GetVersionExA 56746->57017 56749 409b88 6F9C1CD0 56749->56679 56751 41096e 56750->56751 56752 4109ad GetCurrentThreadId 56751->56752 56753 4109c8 56752->56753 56753->56681 57019 40af0c 56754->57019 56758 412964 56758->56683 57031 41de34 8 API calls 56759->57031 56761 419069 57000->56729 57001->56732 57003 408cc4 5 API calls 57002->57003 57004 40903d 57003->57004 57005 4085e4 GetSystemDefaultLCID 57004->57005 57008 40861a 57005->57008 57006 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57006->57008 57007 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 57007->57008 57008->57006 57008->57007 57009 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57008->57009 57013 40867c 57008->57013 57009->57008 57010 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57010->57013 57011 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 57011->57013 57012 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57012->57013 57013->57010 57013->57011 57013->57012 57014 4086ff 57013->57014 57015 403420 4 API calls 57014->57015 57016 408719 57015->57016 57016->56745 57018 40908f 57017->57018 57018->56749 57021 40af13 57019->57021 57020 40af32 57023 41101c 57020->57023 57021->57020 57030 40ae44 19 API calls 57021->57030 57024 41103e 57023->57024 57025 406df4 5 API calls 57024->57025 57026 403450 4 API calls 57024->57026 57027 41105d 57024->57027 57025->57024 57026->57024 57028 403400 4 API calls 57027->57028 57029 411072 57028->57029 57029->56758 57030->57021 57032 41deae 57031->57032 57032->56761 58308 42f530 58309 42f53b 58308->58309 58310 42f53f NtdllDefWindowProc_A 58308->58310 58310->58309 56301 416b52 56302 416bfa 56301->56302 56303 416b6a 56301->56303 56320 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56302->56320 56305 416b84 SendMessageA 56303->56305 56306 416b78 56303->56306 56307 416bd8 56305->56307 56308 416b82 CallWindowProcA 56306->56308 56309 416b9e 56306->56309 56308->56307 56317 41a068 GetSysColor 56309->56317 56312 416ba9 SetTextColor 56313 416bbe 56312->56313 56318 41a068 GetSysColor 56313->56318 56315 416bc3 SetBkColor 56319 41a6f0 GetSysColor CreateBrushIndirect 56315->56319 56317->56312 56318->56315 56319->56307 56320->56307 58311 4358f0 58312 435905 58311->58312 58316 43591f 58312->58316 58317 4352d8 58312->58317 58324 435322 58317->58324 58327 435308 58317->58327 58318 403400 4 API calls 58319 435727 58318->58319 58319->58316 58330 435738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58319->58330 58320 446db4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58320->58327 58321 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58321->58327 58322 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58322->58327 58323 402648 4 API calls 58323->58327 58324->58318 58326 431cb0 4 API calls 58326->58327 58327->58320 58327->58321 58327->58322 58327->58323 58327->58324 58327->58326 58328 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58327->58328 58331 4343c0 58327->58331 58343 434b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58327->58343 58328->58327 58330->58316 58332 43447d 58331->58332 58333 4343ed 58331->58333 58362 434320 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58332->58362 58334 403494 4 API calls 58333->58334 58336 4343fb 58334->58336 58337 403778 4 API calls 58336->58337 58341 43441c 58337->58341 58338 403400 4 API calls 58339 4344cd 58338->58339 58339->58327 58340 43446f 58340->58338 58341->58340 58344 494314 58341->58344 58343->58327 58345 49434c 58344->58345 58346 4943e4 58344->58346 58347 403494 4 API calls 58345->58347 58363 448940 58346->58363 58352 494357 58347->58352 58349 494367 58350 403400 4 API calls 58349->58350 58351 494408 58350->58351 58353 403400 4 API calls 58351->58353 58352->58349 58354 4037b8 4 API calls 58352->58354 58355 494410 58353->58355 58356 494380 58354->58356 58355->58341 58356->58349 58357 4037b8 4 API calls 58356->58357 58358 4943a3 58357->58358 58359 403778 4 API calls 58358->58359 58360 4943d4 58359->58360 58361 403634 4 API calls 58360->58361 58361->58346 58362->58340 58364 448965 58363->58364 58365 4489a8 58363->58365 58366 403494 4 API calls 58364->58366 58368 4489bc 58365->58368 58375 44853c 58365->58375 58367 448970 58366->58367 58372 4037b8 4 API calls 58367->58372 58370 403400 4 API calls 58368->58370 58371 4489ef 58370->58371 58371->58349 58373 44898c 58372->58373 58374 4037b8 4 API calls 58373->58374 58374->58365 58376 403494 4 API calls 58375->58376 58377 448572 58376->58377 58378 4037b8 4 API calls 58377->58378 58379 448584 58378->58379 58380 403778 4 API calls 58379->58380 58381 4485a5 58380->58381 58382 4037b8 4 API calls 58381->58382 58383 4485bd 58382->58383 58384 403778 4 API calls 58383->58384 58385 4485e8 58384->58385 58386 4037b8 4 API calls 58385->58386 58396 448600 58386->58396 58387 448638 58389 403420 4 API calls 58387->58389 58388 4486d3 58392 4486db GetProcAddress 58388->58392 58393 448718 58389->58393 58390 44865b LoadLibraryExA 58390->58396 58391 44866d LoadLibraryA 58391->58396 58394 4486ee 58392->58394 58393->58368 58394->58387 58395 403b80 4 API calls 58395->58396 58396->58387 58396->58388 58396->58390 58396->58391 58396->58395 58397 403450 4 API calls 58396->58397 58399 43da98 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58396->58399 58397->58396 58399->58396 58400 40ce34 58403 406f18 WriteFile 58400->58403 58404 406f35 58403->58404 56321 416654 56322 416661 56321->56322 56323 4166bb 56321->56323 56329 416560 CreateWindowExA 56322->56329 56330 4162da 56322->56330 56324 416668 SetPropA SetPropA 56324->56323 56325 41669b 56324->56325 56326 4166ae SetWindowPos 56325->56326 56326->56323 56329->56324 56331 416306 56330->56331 56332 4162e6 GetClassInfoA 56330->56332 56331->56324 56332->56331 56333 4162fa GetClassInfoA 56332->56333 56333->56331 58405 4222f4 58406 422303 58405->58406 58411 421284 58406->58411 58409 422323 58412 4212f3 58411->58412 58418 421293 58411->58418 58415 421304 58412->58415 58436 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58412->58436 58414 421332 58416 42134d 58414->58416 58417 4213a5 58414->58417 58415->58414 58419 4213ca 58415->58419 58428 421370 GetMenu 58416->58428 58432 4213a3 58416->58432 58426 4213b9 58417->58426 58417->58432 58418->58412 58435 408d34 19 API calls 58418->58435 58423 4213de SetMenu 58419->58423 58419->58432 58420 4213f6 58439 4211cc 10 API calls 58420->58439 58423->58432 58424 4213fd 58424->58409 58434 4221f8 10 API calls 58424->58434 58427 4213c2 SetMenu 58426->58427 58427->58432 58429 421393 58428->58429 58430 42137a 58428->58430 58437 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58429->58437 58433 42138d SetMenu 58430->58433 58432->58420 58438 421e3c 11 API calls 58432->58438 58433->58429 58434->58409 58435->58418 58436->58415 58437->58432 58438->58420 58439->58424 58440 40d07c 58441 40d084 58440->58441 58442 40d0b2 58441->58442 58443 40d0a7 58441->58443 58447 40d0ae 58441->58447 58445 40d0b6 58442->58445 58446 40d0c8 58442->58446 58453 4062a0 GlobalHandle GlobalUnlock GlobalFree 58443->58453 58452 406274 GlobalAlloc GlobalLock 58445->58452 58454 406284 GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 58446->58454 58450 40d0c4 58450->58447 58451 408cc4 5 API calls 58450->58451 58451->58447 58452->58450 58453->58447 58454->58450 58455 44b4b8 58456 44b4c6 58455->58456 58458 44b4e5 58455->58458 58457 44b39c 11 API calls 58456->58457 58456->58458 58457->58458 58459 448738 58460 44876d 58459->58460 58472 448766 58459->58472 58461 448781 58460->58461 58464 44853c 7 API calls 58460->58464 58462 403494 4 API calls 58461->58462 58461->58472 58465 44879a 58462->58465 58463 403400 4 API calls 58466 448917 58463->58466 58464->58461 58467 4037b8 4 API calls 58465->58467 58468 4487b6 58467->58468 58469 4037b8 4 API calls 58468->58469 58470 4487d2 58469->58470 58471 4487e6 58470->58471 58470->58472 58473 4037b8 4 API calls 58471->58473 58472->58463 58474 448800 58473->58474 58475 431be0 4 API calls 58474->58475 58476 448822 58475->58476 58477 431cb0 4 API calls 58476->58477 58483 448842 58476->58483 58477->58476 58478 448898 58491 442344 58478->58491 58480 448880 58480->58478 58503 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58480->58503 58482 4488cc GetLastError 58504 4484d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58482->58504 58483->58480 58502 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58483->58502 58486 4488db 58505 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58486->58505 58488 4488f0 58506 443630 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58488->58506 58490 4488f8 58492 443322 58491->58492 58493 44237d 58491->58493 58495 403400 4 API calls 58492->58495 58494 403400 4 API calls 58493->58494 58496 442385 58494->58496 58497 443337 58495->58497 58498 431be0 4 API calls 58496->58498 58497->58482 58499 442391 58498->58499 58500 443312 58499->58500 58507 441a1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58499->58507 58500->58482 58502->58483 58503->58478 58504->58486 58505->58488 58506->58490 58507->58499 58508 4165fc 73EA5CF0 58509 42e3ff SetErrorMode
                                                                  Strings
                                                                  • Time stamp of existing file: %s, xrefs: 00470CD3
                                                                  • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470C76
                                                                  • Non-default bitness: 32-bit, xrefs: 00470B63
                                                                  • .tmp, xrefs: 0047125F
                                                                  • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470F6C
                                                                  • Installing into GAC, xrefs: 004719A2
                                                                  • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470F5D
                                                                  • Time stamp of our file: %s, xrefs: 00470C43
                                                                  • Couldn't read time stamp. Skipping., xrefs: 00470FDD
                                                                  • Version of existing file: (none), xrefs: 00470FA2
                                                                  • Installing the file., xrefs: 004711B1
                                                                  • Skipping due to "onlyifdestfileexists" flag., xrefs: 004711A2
                                                                  • Same version. Skipping., xrefs: 00470F8D
                                                                  • Will register the file (a type library) later., xrefs: 004717A1
                                                                  • Incrementing shared file count (32-bit)., xrefs: 00471833
                                                                  • User opted not to overwrite the existing file. Skipping., xrefs: 004710F5
                                                                  • Version of our file: %u.%u.%u.%u, xrefs: 00470D98
                                                                  • Incrementing shared file count (64-bit)., xrefs: 0047181A
                                                                  • , xrefs: 00470E77, 00471048, 004710C6
                                                                  • Dest filename: %s, xrefs: 00470B3C
                                                                  • Version of our file: (none), xrefs: 00470DA4
                                                                  • Dest file is protected by Windows File Protection., xrefs: 00470B95
                                                                  • Same time stamp. Skipping., xrefs: 00470FFD
                                                                  • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047113E
                                                                  • Time stamp of existing file: (failed to read), xrefs: 00470CDF
                                                                  • Version of existing file: %u.%u.%u.%u, xrefs: 00470E24
                                                                  • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471094
                                                                  • @, xrefs: 00470A58
                                                                  • Non-default bitness: 64-bit, xrefs: 00470B57
                                                                  • Dest file exists., xrefs: 00470C63
                                                                  • Existing file is a newer version. Skipping., xrefs: 00470EAA
                                                                  • Will register the file (a DLL/OCX) later., xrefs: 004717AD
                                                                  • Existing file has a later time stamp. Skipping., xrefs: 00471077
                                                                  • -- File entry --, xrefs: 004709A3
                                                                  • Uninstaller requires administrator: %s, xrefs: 0047141D
                                                                  • Failed to strip read-only attribute., xrefs: 0047117B
                                                                  • InUn, xrefs: 004713ED
                                                                  • Stripped read-only attribute., xrefs: 0047116F
                                                                  • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470F78
                                                                  • Time stamp of our file: (failed to read), xrefs: 00470C4F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                  • API String ID: 0-4021121268
                                                                  • Opcode ID: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                  • Instruction ID: 00dcbbebc37e67597ddb11db3b00c056d98a3663d13b65a1c96947d1bb872b77
                                                                  • Opcode Fuzzy Hash: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                                  • Instruction Fuzzy Hash: 2C927534A04288DFDB11DFA9C845BDDBBB5AF05304F5480ABE848AB392C7789E45CB59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1546 42e0ac-42e0bd 1547 42e0c8-42e0ed AllocateAndInitializeSid 1546->1547 1548 42e0bf-42e0c3 1546->1548 1549 42e297-42e29f 1547->1549 1550 42e0f3-42e110 GetVersion 1547->1550 1548->1549 1551 42e112-42e127 GetModuleHandleA GetProcAddress 1550->1551 1552 42e129-42e12b 1550->1552 1551->1552 1553 42e152-42e16c GetCurrentThread OpenThreadToken 1552->1553 1554 42e12d-42e13b CheckTokenMembership 1552->1554 1557 42e1a3-42e1cb GetTokenInformation 1553->1557 1558 42e16e-42e178 GetLastError 1553->1558 1555 42e141-42e14d 1554->1555 1556 42e279-42e28f FreeSid 1554->1556 1555->1556 1559 42e1e6-42e20a call 402648 GetTokenInformation 1557->1559 1560 42e1cd-42e1d5 GetLastError 1557->1560 1561 42e184-42e197 GetCurrentProcess OpenProcessToken 1558->1561 1562 42e17a-42e17f call 4031bc 1558->1562 1573 42e218-42e220 1559->1573 1574 42e20c-42e216 call 4031bc * 2 1559->1574 1560->1559 1564 42e1d7-42e1e1 call 4031bc * 2 1560->1564 1561->1557 1563 42e199-42e19e call 4031bc 1561->1563 1562->1549 1563->1549 1564->1549 1576 42e222-42e223 1573->1576 1577 42e253-42e271 call 402660 CloseHandle 1573->1577 1574->1549 1580 42e225-42e238 EqualSid 1576->1580 1584 42e23a-42e247 1580->1584 1585 42e24f-42e251 1580->1585 1584->1585 1588 42e249-42e24d 1584->1588 1585->1577 1585->1580 1588->1577
                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                  • GetVersion.KERNEL32(00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                  • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                  • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                  • String ID: CheckTokenMembership$advapi32.dll
                                                                  • API String ID: 2252812187-1888249752
                                                                  • Opcode ID: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                  • Instruction ID: 1c76bb1748f4203a7925b196b2d5623075850b54fd141b793a49aa5c8bf5bf77
                                                                  • Opcode Fuzzy Hash: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                                  • Instruction Fuzzy Hash: 22517571B44615EEEB10EAE6A842BBF7BACDB09304F9404BBB501F7282D57C9904867D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1610 4502ac-4502b9 1611 4502bf-4502cc GetVersion 1610->1611 1612 450368-450372 1610->1612 1611->1612 1613 4502d2-4502e8 LoadLibraryA 1611->1613 1613->1612 1614 4502ea-450363 GetProcAddress * 6 1613->1614 1614->1612
                                                                  APIs
                                                                  • GetVersion.KERNEL32(00480618), ref: 004502BF
                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480618), ref: 004502D7
                                                                  • GetProcAddress.KERNEL32(6FEF0000,RmStartSession), ref: 004502F5
                                                                  • GetProcAddress.KERNEL32(6FEF0000,RmRegisterResources), ref: 0045030A
                                                                  • GetProcAddress.KERNEL32(6FEF0000,RmGetList), ref: 0045031F
                                                                  • GetProcAddress.KERNEL32(6FEF0000,RmShutdown), ref: 00450334
                                                                  • GetProcAddress.KERNEL32(6FEF0000,RmRestart), ref: 00450349
                                                                  • GetProcAddress.KERNEL32(6FEF0000,RmEndSession), ref: 0045035E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoadVersion
                                                                  • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                  • API String ID: 1968650500-3419246398
                                                                  • Opcode ID: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                  • Instruction ID: 1cbd638475316f18669290cc5db137bdc69b0bbe350ace6e5bf0246856dda450
                                                                  • Opcode Fuzzy Hash: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                                  • Instruction Fuzzy Hash: CC11A5B4541740DBDA10FBA5BB85A2A32E9E72C715B08563BEC44AA1A2DB7C4448CF9C

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1674 423c1c-423c50 1675 423c52-423c53 1674->1675 1676 423c84-423c9b call 423b78 1674->1676 1678 423c55-423c71 call 40b44c 1675->1678 1681 423cfc-423d01 1676->1681 1682 423c9d 1676->1682 1710 423c73-423c7b 1678->1710 1711 423c80-423c82 1678->1711 1684 423d03 1681->1684 1685 423d37-423d3c 1681->1685 1686 423ca3-423ca6 1682->1686 1687 423d60-423d70 1682->1687 1688 423fc1-423fc9 1684->1688 1689 423d09-423d11 1684->1689 1692 423d42-423d45 1685->1692 1693 4240aa-4240b8 IsIconic 1685->1693 1690 423cd5-423cd8 1686->1690 1691 423ca8 1686->1691 1694 423d72-423d77 1687->1694 1695 423d7b-423d83 call 4241a4 1687->1695 1699 424162-42416a 1688->1699 1705 423fcf-423fda call 4181f0 1688->1705 1697 423f23-423f4a SendMessageA 1689->1697 1698 423d17-423d1c 1689->1698 1706 423db9-423dc0 1690->1706 1707 423cde-423cdf 1690->1707 1701 423e06-423e16 call 423b94 1691->1701 1702 423cae-423cb1 1691->1702 1703 4240e6-4240fb call 424860 1692->1703 1704 423d4b-423d4c 1692->1704 1693->1699 1700 4240be-4240c9 GetFocus 1693->1700 1708 423d88-423d90 call 4241ec 1694->1708 1709 423d79-423d9c call 423b94 1694->1709 1695->1699 1697->1699 1713 423d22-423d23 1698->1713 1714 42405a-424065 1698->1714 1715 424181-424187 1699->1715 1700->1699 1722 4240cf-4240d8 call 41f004 1700->1722 1701->1699 1723 423cb7-423cba 1702->1723 1724 423e2e-423e4a PostMessageA call 423b94 1702->1724 1703->1699 1717 423d52-423d55 1704->1717 1718 4240fd-424104 1704->1718 1705->1699 1766 423fe0-423fef call 4181f0 IsWindowEnabled 1705->1766 1706->1699 1727 423dc6-423dcd 1706->1727 1728 423ce5-423ce8 1707->1728 1729 423f4f-423f56 1707->1729 1708->1699 1709->1699 1710->1715 1711->1676 1711->1678 1730 424082-42408d 1713->1730 1731 423d29-423d2c 1713->1731 1714->1699 1733 42406b-42407d 1714->1733 1734 424130-424137 1717->1734 1735 423d5b 1717->1735 1744 424106-424119 call 4244e4 1718->1744 1745 42411b-42412e call 42453c 1718->1745 1722->1699 1780 4240de-4240e4 SetFocus 1722->1780 1741 423cc0-423cc3 1723->1741 1742 423eb5-423ebc 1723->1742 1724->1699 1727->1699 1747 423dd3-423dd9 1727->1747 1748 423cee-423cf1 1728->1748 1749 423e4f-423e6f call 423b94 1728->1749 1729->1699 1737 423f5c-423f61 call 404e54 1729->1737 1730->1699 1755 424093-4240a5 1730->1755 1752 423d32 1731->1752 1753 423f66-423f6e 1731->1753 1733->1699 1750 42414a-424159 1734->1750 1751 424139-424148 1734->1751 1754 42415b-42415c call 423b94 1735->1754 1737->1699 1761 423cc9-423cca 1741->1761 1762 423dde-423dec IsIconic 1741->1762 1763 423ebe-423ed1 call 423b24 1742->1763 1764 423eef-423f00 call 423b94 1742->1764 1744->1699 1745->1699 1747->1699 1767 423cf7 1748->1767 1768 423e1b-423e29 call 424188 1748->1768 1795 423e93-423eb0 call 423a94 PostMessageA 1749->1795 1796 423e71-423e8e call 423b24 PostMessageA 1749->1796 1750->1699 1751->1699 1752->1754 1753->1699 1778 423f74-423f7b 1753->1778 1791 424161 1754->1791 1755->1699 1781 423cd0 1761->1781 1782 423da1-423da9 1761->1782 1771 423dfa-423e01 call 423b94 1762->1771 1772 423dee-423df5 call 423bd0 1762->1772 1808 423ee3-423eea call 423b94 1763->1808 1809 423ed3-423edd call 41ef68 1763->1809 1802 423f02-423f08 call 41eeb4 1764->1802 1803 423f16-423f1e call 423a94 1764->1803 1766->1699 1799 423ff5-424004 call 4181f0 IsWindowVisible 1766->1799 1767->1754 1768->1699 1771->1699 1772->1699 1778->1699 1794 423f81-423f90 call 4181f0 IsWindowEnabled 1778->1794 1780->1699 1781->1754 1782->1699 1797 423daf-423db4 call 422c5c 1782->1797 1791->1699 1794->1699 1823 423f96-423fac call 412320 1794->1823 1795->1699 1796->1699 1797->1699 1799->1699 1825 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1799->1825 1821 423f0d-423f10 1802->1821 1803->1699 1808->1699 1809->1808 1821->1803 1823->1699 1830 423fb2-423fbc 1823->1830 1825->1699 1830->1699
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                  • Instruction ID: adb1057a9d0d7329e5210459a6b6756db00cf693e958207d3a560887342e2c6b
                                                                  • Opcode Fuzzy Hash: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                                  • Instruction Fuzzy Hash: EBE1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE81DB08

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1989 467710-467726 1990 467730-4677e7 call 49514c call 402b30 * 6 1989->1990 1991 467728-46772b call 402d30 1989->1991 2008 467824-46783d 1990->2008 2009 4677e9-467810 call 41464c 1990->2009 1991->1990 2015 46783f-467866 call 41462c 2008->2015 2016 46787a-467888 call 495454 2008->2016 2013 467815-46781f call 41460c 2009->2013 2014 467812 2009->2014 2013->2008 2014->2013 2024 46786b-467875 call 4145ec 2015->2024 2025 467868 2015->2025 2022 46788a-467899 call 49529c 2016->2022 2023 46789b-46789d call 4953c0 2016->2023 2030 4678a2-4678f5 call 494db0 call 41a3e0 * 2 2022->2030 2023->2030 2024->2016 2025->2024 2037 467906-46791b call 451444 call 414b28 2030->2037 2038 4678f7-467904 call 414b28 2030->2038 2043 467920-467927 2037->2043 2038->2043 2045 46796f-467df5 call 4951ec call 495510 call 41462c * 3 call 4146cc call 4145ec * 3 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f80 call 460fd4 LoadBitmapA call 41d6c0 call 460fa4 call 460fbc call 4674ec call 469000 call 466b6c call 40357c call 414b28 call 466ea4 call 466eac call 466b6c call 40357c * 2 call 414b28 call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 414b28 * 2 call 469000 call 414b28 * 2 call 466ea4 call 41460c call 466ea4 call 41460c call 469000 call 414b28 call 466ea4 call 466eac call 469000 call 414b28 call 466ea4 call 41460c * 2 call 414b28 call 466ea4 call 41460c 2043->2045 2046 467929-46796a call 4146cc call 414710 call 420fa8 call 420fd4 call 420b78 call 420ba4 2043->2046 2176 467df7-467e4f call 41460c call 414b28 call 466ea4 call 41460c 2045->2176 2177 467e51-467e6a call 414a54 * 2 2045->2177 2046->2045 2184 467e6f-467f20 call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2176->2184 2177->2184 2203 467f22-467f3d 2184->2203 2204 467f5a-468190 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 4181f0 call 42ed48 call 414b28 call 4951ec call 495510 call 41462c call 466b6c call 414b28 call 466ea4 call 41460c call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 41460c call 466eac call 466b6c call 414b28 call 466ea4 2184->2204 2205 467f42-467f55 call 41460c 2203->2205 2206 467f3f 2203->2206 2265 468192-46819b 2204->2265 2266 4681d1-46828a call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2204->2266 2205->2204 2206->2205 2265->2266 2267 46819d-4681cc call 414a54 call 466eac 2265->2267 2284 4682c4-4686e5 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 414b28 call 4951ec call 495510 call 41462c call 414b28 call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 42bbe0 call 495520 call 44e8c0 call 466b6c call 469000 call 466b6c call 469000 call 466b6c call 469000 * 2 call 414b28 call 466ea4 call 466eac call 469000 call 494db0 call 41a3e0 call 466b6c call 40357c call 414b28 call 466ea4 call 41460c call 414b28 * 2 call 495520 call 403494 call 40357c * 2 call 414b28 2266->2284 2285 46828c-4682a7 2266->2285 2267->2266 2384 4686e7-468704 call 44ffc8 call 450124 2284->2384 2385 468709-468710 2284->2385 2286 4682ac-4682bf call 41460c 2285->2286 2287 4682a9 2285->2287 2286->2284 2287->2286 2384->2385 2386 468734-46873b 2385->2386 2387 468712-46872f call 44ffc8 call 450124 2385->2387 2391 46875f-4687a5 call 4181f0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 4690f4 2386->2391 2392 46873d-46875a call 44ffc8 call 450124 2386->2392 2387->2386 2405 4687a7-4687ae 2391->2405 2406 4687bf 2391->2406 2392->2391 2407 4687b0-4687b9 2405->2407 2408 4687bb-4687bd 2405->2408 2409 4687c1-4687d0 2406->2409 2407->2406 2407->2408 2408->2409 2410 4687d2-4687d9 2409->2410 2411 4687ea 2409->2411 2412 4687e6-4687e8 2410->2412 2413 4687db-4687e4 2410->2413 2414 4687ec-468806 2411->2414 2412->2414 2413->2411 2413->2412 2415 4688af-4688b6 2414->2415 2416 46880c-468815 2414->2416 2417 4688bc-4688df call 47bfd8 call 403450 2415->2417 2418 468949-468957 call 414b28 2415->2418 2419 468817-46886e call 47bfd8 call 414b28 call 47bfd8 call 414b28 call 47bfd8 call 414b28 2416->2419 2420 468870-4688aa call 414b28 * 3 2416->2420 2442 4688f0-468904 call 403494 2417->2442 2443 4688e1-4688ee call 47c178 2417->2443 2427 46895c-468965 2418->2427 2419->2415 2420->2415 2431 468a75-468aa4 call 42b97c call 44e84c 2427->2431 2432 46896b-468983 call 429fe8 2427->2432 2459 468b52-468b56 2431->2459 2460 468aaa-468aae 2431->2460 2449 468985-468989 2432->2449 2450 4689fa-4689fe 2432->2450 2464 468916-468947 call 42c814 call 42cbd0 call 403494 call 414b28 2442->2464 2465 468906-468911 call 403494 2442->2465 2443->2464 2457 46898b-4689c5 call 40b44c call 47bfd8 2449->2457 2455 468a00-468a09 2450->2455 2456 468a4e-468a52 2450->2456 2455->2456 2466 468a0b-468a16 2455->2466 2462 468a66-468a70 call 42a06c 2456->2462 2463 468a54-468a64 call 42a06c 2456->2463 2517 4689c7-4689ce 2457->2517 2518 4689f4-4689f8 2457->2518 2471 468bd5-468bd9 2459->2471 2472 468b58-468b5f 2459->2472 2470 468ab0-468ac2 call 40b44c 2460->2470 2462->2431 2463->2431 2464->2427 2465->2464 2466->2456 2468 468a18-468a1c 2466->2468 2478 468a1e-468a41 call 40b44c call 406acc 2468->2478 2497 468af4-468b2b call 47bfd8 call 44cb1c 2470->2497 2498 468ac4-468af2 call 47bfd8 call 44cbec 2470->2498 2481 468c42-468c4b 2471->2481 2482 468bdb-468bf2 call 40b44c 2471->2482 2472->2471 2483 468b61-468b68 2472->2483 2527 468a43-468a46 2478->2527 2528 468a48-468a4c 2478->2528 2490 468c4d-468c65 call 40b44c call 469d68 2481->2490 2491 468c6a-468c7f call 46724c call 466fc8 2481->2491 2509 468bf4-468c30 call 40b44c call 469d68 * 2 call 469c08 2482->2509 2510 468c32-468c40 call 469d68 2482->2510 2483->2471 2493 468b6a-468b75 2483->2493 2490->2491 2542 468cd1-468cdb call 414a54 2491->2542 2543 468c81-468ca4 call 42a050 call 40b44c 2491->2543 2493->2491 2501 468b7b-468b7f 2493->2501 2535 468b30-468b34 2497->2535 2498->2535 2511 468b81-468b97 call 40b44c 2501->2511 2509->2491 2510->2491 2540 468bca-468bce 2511->2540 2541 468b99-468bc5 call 42a06c call 469d68 call 469c08 2511->2541 2517->2518 2529 4689d0-4689e2 call 406acc 2517->2529 2518->2450 2518->2457 2527->2456 2528->2456 2528->2478 2529->2518 2554 4689e4-4689ee 2529->2554 2545 468b36-468b3d 2535->2545 2546 468b3f-468b41 2535->2546 2540->2511 2547 468bd0 2540->2547 2541->2491 2555 468ce0-468cff call 414a54 2542->2555 2571 468ca6-468cad 2543->2571 2572 468caf-468cbe call 414a54 2543->2572 2545->2546 2553 468b48-468b4c 2545->2553 2546->2553 2547->2491 2553->2459 2553->2470 2554->2518 2559 4689f0 2554->2559 2567 468d01-468d24 call 42a050 call 469ec8 2555->2567 2568 468d29-468d4c call 47bfd8 call 403450 2555->2568 2559->2518 2567->2568 2586 468d4e-468d57 2568->2586 2587 468d68-468d71 2568->2587 2571->2572 2576 468cc0-468ccf call 414a54 2571->2576 2572->2555 2576->2555 2586->2587 2588 468d59-468d66 call 47c178 2586->2588 2589 468d87-468d97 call 403494 2587->2589 2590 468d73-468d85 call 403684 2587->2590 2598 468da9-468dc0 call 414b28 2588->2598 2589->2598 2590->2589 2597 468d99-468da4 call 403494 2590->2597 2597->2598 2602 468df6-468e00 call 414a54 2598->2602 2603 468dc2-468dc9 2598->2603 2607 468e05-468e2a call 403400 * 3 2602->2607 2605 468dd6-468de0 call 42b0f4 2603->2605 2606 468dcb-468dd4 2603->2606 2608 468de5-468df4 call 414a54 2605->2608 2606->2605 2606->2608 2608->2607
                                                                  APIs
                                                                    • Part of subcall function 0049529C: GetWindowRect.USER32(00000000), ref: 004952B2
                                                                  • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467ADF
                                                                    • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467AF9), ref: 0041D6EB
                                                                    • Part of subcall function 004674EC: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                    • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                    • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                    • Part of subcall function 00466EAC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                    • Part of subcall function 00495520: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0049552A
                                                                    • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                    • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                    • Part of subcall function 004951EC: 73E9A570.USER32(00000000,?,?,?), ref: 0049520E
                                                                    • Part of subcall function 004951EC: SelectObject.GDI32(?,00000000), ref: 00495234
                                                                    • Part of subcall function 004951EC: 73E9A480.USER32(00000000,?,00495292,0049528B,?,00000000,?,?,?), ref: 00495285
                                                                    • Part of subcall function 00495510: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0049551A
                                                                  • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,02139D60,0213B94C,?,?,0213B97C,?,?,0213B9CC,?), ref: 00468769
                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046877A
                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468792
                                                                    • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                                  • String ID: $(Default)$STOPIMAGE$k H
                                                                  • API String ID: 3271511185-4041106330
                                                                  • Opcode ID: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                  • Instruction ID: 2b4e5e33b1fbe28ecfb2af168a793b611adbc31a6fcb8730d9662ddd01b2079a
                                                                  • Opcode Fuzzy Hash: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                                  • Instruction Fuzzy Hash: 6CF2C7386005208FCB00EB59D9D9F9973F5BF49304F1582BAF5049B36ADB74AC46CB9A
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 00475251
                                                                  • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047532E
                                                                  • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047533C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstNext
                                                                  • String ID: unins$unins???.*
                                                                  • API String ID: 3541575487-1009660736
                                                                  • Opcode ID: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                  • Instruction ID: 9ba6e551af2be01ae54f2bf6d4feb37662207b66b60327addd096aea054bc42d
                                                                  • Opcode Fuzzy Hash: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                                  • Instruction Fuzzy Hash: 333153706005489FDB10EB65D981ADE77B9EF44344F5080F6A80CAB3B2DBB89F418B58
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A89
                                                                  • GetLastError.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A91
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileFindFirstLast
                                                                  • String ID:
                                                                  • API String ID: 873889042-0
                                                                  • Opcode ID: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                  • Instruction ID: 2517da8cadb6fb7e7a3bde91136fc32a544ec95f0d2c756002249f4fd287b9db
                                                                  • Opcode Fuzzy Hash: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                                  • Instruction Fuzzy Hash: B9F0F971A04604AB8B20DBA69D0149EB7ACEB46725710467BFC14E3292EAB94E048558
                                                                  APIs
                                                                  • GetVersion.KERNEL32(0000049C,0046E422), ref: 0046E396
                                                                  • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,0000049C,0046E422), ref: 0046E3B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstanceVersion
                                                                  • String ID:
                                                                  • API String ID: 1462612201-0
                                                                  • Opcode ID: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                  • Instruction ID: ca204bcfc643a6eeda20b237376823326e775e7ff9cf44b6f5c5a065e078b710
                                                                  • Opcode Fuzzy Hash: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                                  • Instruction Fuzzy Hash: 80F0A035282200DEEB1097AADC45B4A37C1BB20718F40007BF440D7391E3FDD8908A5F
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                  • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                                  • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                                  • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                  • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                  • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                                  • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: NameUser
                                                                  • String ID:
                                                                  • API String ID: 2645101109-0
                                                                  • Opcode ID: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                  • Instruction ID: 445fb77b721d6e8bc33303137c5d79e403f1e24c04085a252f4bbff9531eb306
                                                                  • Opcode Fuzzy Hash: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                                  • Instruction Fuzzy Hash: 6AD0C271304704A3C700AAA99C825AA35DD8B84315F00483F3CC6DA3C3FABDDA481696
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F54C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                  • Instruction ID: 55aff4e3ab0814f5b97a0c0db1ec4da333d3f7c11773d115dc143ade784a7ab4
                                                                  • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                                  • Instruction Fuzzy Hash: BAD05E7120010C7B9B00DE9CE840C6B33BC9B88700BA08825F918C7202C634ED5187A8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 406 46f300-46f332 407 46f334-46f33b 406->407 408 46f34f 406->408 409 46f346-46f34d 407->409 410 46f33d-46f344 407->410 411 46f356-46f38e call 403634 call 403738 call 42ded0 408->411 409->411 410->408 410->409 418 46f390-46f3a4 call 403738 call 42ded0 411->418 419 46f3a9-46f3d2 call 403738 call 42ddf4 411->419 418->419 427 46f3d4-46f3dd call 46efd0 419->427 428 46f3e2-46f40b call 46f0ec 419->428 427->428 432 46f41d-46f420 call 403400 428->432 433 46f40d-46f41b call 403494 428->433 437 46f425-46f470 call 46f0ec call 42c40c call 46f134 call 46f0ec 432->437 433->437 446 46f486-46f4a7 call 455588 call 46f0ec 437->446 447 46f472-46f485 call 46f15c 437->447 454 46f4fd-46f504 446->454 455 46f4a9-46f4fc call 46f0ec call 431414 call 46f0ec call 431414 call 46f0ec 446->455 447->446 456 46f506-46f543 call 431414 call 46f0ec call 431414 call 46f0ec 454->456 457 46f544-46f54b 454->457 455->454 456->457 460 46f58c-46f5b1 call 40b44c call 46f0ec 457->460 461 46f54d-46f58b call 46f0ec * 3 457->461 479 46f5b3-46f5be call 47bfd8 460->479 480 46f5c0-46f5c9 call 403494 460->480 461->460 491 46f5ce-46f5d9 call 478d20 479->491 480->491 496 46f5e2 491->496 497 46f5db-46f5e0 491->497 498 46f5e7-46f7b1 call 403778 call 46f0ec call 47bfd8 call 46f134 call 403494 call 40357c * 2 call 46f0ec call 403494 call 40357c * 2 call 46f0ec call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 496->498 497->498 561 46f7c7-46f7d5 call 46f15c 498->561 562 46f7b3-46f7c5 call 46f0ec 498->562 566 46f7da 561->566 567 46f7db-46f824 call 46f15c call 46f190 call 46f0ec call 47bfd8 call 46f1f4 562->567 566->567 578 46f826-46f849 call 46f15c * 2 567->578 579 46f84a-46f857 567->579 578->579 580 46f926-46f92d 579->580 581 46f85d-46f864 579->581 585 46f987-46f99d RegCloseKey 580->585 586 46f92f-46f965 call 4946bc 580->586 583 46f866-46f86d 581->583 584 46f8d1-46f8e0 581->584 583->584 589 46f86f-46f893 call 430bdc 583->589 588 46f8e3-46f8f0 584->588 586->585 592 46f907-46f920 call 430c18 call 46f15c 588->592 593 46f8f2-46f8ff 588->593 589->588 601 46f895-46f896 589->601 604 46f925 592->604 593->592 597 46f901-46f905 593->597 597->580 597->592 603 46f898-46f8be call 40b44c call 47954c 601->603 609 46f8c0-46f8c6 call 430bdc 603->609 610 46f8cb-46f8cd 603->610 604->580 609->610 610->603 612 46f8cf 610->612 612->588
                                                                  APIs
                                                                    • Part of subcall function 0046F0EC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                    • Part of subcall function 0046F15C: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                  • RegCloseKey.ADVAPI32(?,0046F9A5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F9F0,?,?,0049C1D0,00000000), ref: 0046F998
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Value$Close
                                                                  • String ID: " /SILENT$5.5.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                  • API String ID: 3391052094-1769338133
                                                                  • Opcode ID: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                  • Instruction ID: 138fe2a8aa43a8f2517aa1aee13eacc10811dc4b0cf032f1bf39601b5d09dcc5
                                                                  • Opcode Fuzzy Hash: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                                  • Instruction Fuzzy Hash: 96126331A001089BCB04EB55F891ADE77F5FB49304F60807BE841AB396EB79BD49CB59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1027 492208-49223c call 403684 1030 49223e-49224d call 446fac Sleep 1027->1030 1031 492252-49225f call 403684 1027->1031 1036 4926e2-4926fc call 403420 1030->1036 1037 49228e-49229b call 403684 1031->1037 1038 492261-492289 call 447008 call 403738 FindWindowA call 447288 1031->1038 1046 4922ca-4922d7 call 403684 1037->1046 1047 49229d-4922c0 call 447008 call 403738 FindWindowA call 447288 1037->1047 1038->1036 1054 4922d9-49231b call 446fac * 4 SendMessageA call 447288 1046->1054 1055 492320-49232d call 403684 1046->1055 1067 4922c5 1047->1067 1054->1036 1064 49237c-492389 call 403684 1055->1064 1065 49232f-492377 call 446fac * 4 PostMessageA call 4470e0 1055->1065 1076 4923d8-4923e5 call 403684 1064->1076 1077 49238b-4923d3 call 446fac * 4 SendNotifyMessageA call 4470e0 1064->1077 1065->1036 1067->1036 1089 492412-49241f call 403684 1076->1089 1090 4923e7-49240d call 447008 call 403738 RegisterClipboardFormatA call 447288 1076->1090 1077->1036 1102 492421-49245b call 446fac * 3 SendMessageA call 447288 1089->1102 1103 492460-49246d call 403684 1089->1103 1090->1036 1102->1036 1115 49246f-4924af call 446fac * 3 PostMessageA call 4470e0 1103->1115 1116 4924b4-4924c1 call 403684 1103->1116 1115->1036 1128 492508-492515 call 403684 1116->1128 1129 4924c3-492503 call 446fac * 3 SendNotifyMessageA call 4470e0 1116->1129 1140 49256a-492577 call 403684 1128->1140 1141 492517-492535 call 447008 call 42e3a4 1128->1141 1129->1036 1151 492579-4925a5 call 447008 call 403738 call 446fac GetProcAddress 1140->1151 1152 4925f1-4925fe call 403684 1140->1152 1158 492547-492555 GetLastError call 447288 1141->1158 1159 492537-492545 call 447288 1141->1159 1183 4925e1-4925ec call 4470e0 1151->1183 1184 4925a7-4925dc call 446fac * 2 call 447288 call 4470e0 1151->1184 1164 492600-492621 call 446fac FreeLibrary call 4470e0 1152->1164 1165 492626-492633 call 403684 1152->1165 1170 49255a-492565 call 447288 1158->1170 1159->1170 1164->1036 1180 492658-492665 call 403684 1165->1180 1181 492635-492653 call 447008 call 403738 CreateMutexA 1165->1181 1170->1036 1191 49269b-4926a8 call 403684 1180->1191 1192 492667-492699 call 48c638 call 403574 call 403738 OemToCharBuffA call 48c650 1180->1192 1181->1036 1183->1036 1184->1036 1204 4926aa-4926dc call 48c638 call 403574 call 403738 CharToOemBuffA call 48c650 1191->1204 1205 4926de 1191->1205 1192->1036 1204->1036 1205->1036
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,00000000,004926FD,?,?,?,?,00000000,00000000,00000000), ref: 00492248
                                                                  • FindWindowA.USER32(00000000,00000000), ref: 00492279
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FindSleepWindow
                                                                  • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                  • API String ID: 3078808852-3310373309
                                                                  • Opcode ID: 04389725d469abda592edc5d686fc9dc2997d938da4e0f8a72bd6865d44b9f5f
                                                                  • Instruction ID: d4b9d66e752ac066ee841e8e0b6dcdad2790022369f15f3c2d7e05b7c0e56f01
                                                                  • Opcode Fuzzy Hash: 04389725d469abda592edc5d686fc9dc2997d938da4e0f8a72bd6865d44b9f5f
                                                                  • Instruction Fuzzy Hash: 7BC18360B042003BDB14BE3E8D4651F599AAF98704B21DA3FB446EB78BDE7DDC0A4359

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1589 4834fc-483521 GetModuleHandleA GetProcAddress 1590 483588-48358d GetSystemInfo 1589->1590 1591 483523-483539 GetNativeSystemInfo GetProcAddress 1589->1591 1592 483592-48359b 1590->1592 1591->1592 1593 48353b-483546 GetCurrentProcess 1591->1593 1594 4835ab-4835b2 1592->1594 1595 48359d-4835a1 1592->1595 1593->1592 1602 483548-48354c 1593->1602 1598 4835cd-4835d2 1594->1598 1596 4835a3-4835a7 1595->1596 1597 4835b4-4835bb 1595->1597 1600 4835a9-4835c6 1596->1600 1601 4835bd-4835c4 1596->1601 1597->1598 1600->1598 1601->1598 1602->1592 1603 48354e-483555 call 452708 1602->1603 1603->1592 1607 483557-483564 GetProcAddress 1603->1607 1607->1592 1608 483566-48357d GetModuleHandleA GetProcAddress 1607->1608 1608->1592 1609 48357f-483586 1608->1609 1609->1592
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0048350D
                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0048351A
                                                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483528
                                                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483530
                                                                  • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0048353C
                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0048355D
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483570
                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483576
                                                                  • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0048358D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                  • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                  • API String ID: 2230631259-2623177817
                                                                  • Opcode ID: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                  • Instruction ID: aef9cc714e700b71c16e3c25fef244724f393c0ebf8792b51c17ae6c670cb8ad
                                                                  • Opcode Fuzzy Hash: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                                  • Instruction Fuzzy Hash: 3C11B181104341B4DA22BB799C4AB7FA5C88B14F1EF084C3B6C41662C2DBBCCF45972E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1615 4690f4-46912c call 47bfd8 1618 469132-469142 call 478d40 1615->1618 1619 46930e-469328 call 403420 1615->1619 1624 469147-46918c call 4078fc call 403738 call 42de2c 1618->1624 1630 469191-469193 1624->1630 1631 469304-469308 1630->1631 1632 469199-4691ae 1630->1632 1631->1619 1631->1624 1633 4691c3-4691ca 1632->1633 1634 4691b0-4691be call 42dd5c 1632->1634 1636 4691f7-4691fe 1633->1636 1637 4691cc-4691ee call 42dd5c call 42dd74 1633->1637 1634->1633 1639 469257-46925e 1636->1639 1640 469200-469225 call 42dd5c * 2 1636->1640 1637->1636 1656 4691f0 1637->1656 1642 4692a4-4692ab 1639->1642 1643 469260-469272 call 42dd5c 1639->1643 1659 469227-469230 call 431508 1640->1659 1660 469235-469247 call 42dd5c 1640->1660 1645 4692e6-4692fc RegCloseKey 1642->1645 1646 4692ad-4692e1 call 42dd5c * 3 1642->1646 1657 469274-46927d call 431508 1643->1657 1658 469282-469294 call 42dd5c 1643->1658 1646->1645 1656->1636 1657->1658 1658->1642 1668 469296-46929f call 431508 1658->1668 1659->1660 1660->1639 1672 469249-469252 call 431508 1660->1672 1668->1642 1672->1639
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(?,0046930E,?,?,00000001,00000000,00000000,00469329,?,00000000,00000000,?), ref: 004692F7
                                                                  Strings
                                                                  • Inno Setup: Deselected Components, xrefs: 00469238
                                                                  • Inno Setup: Setup Type, xrefs: 00469206
                                                                  • Inno Setup: Selected Components, xrefs: 00469216
                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469153
                                                                  • Inno Setup: Deselected Tasks, xrefs: 00469285
                                                                  • Inno Setup: Selected Tasks, xrefs: 00469263
                                                                  • Inno Setup: User Info: Name, xrefs: 004692B3
                                                                  • Inno Setup: Icon Group, xrefs: 004691D2
                                                                  • Inno Setup: App Path, xrefs: 004691B6
                                                                  • Inno Setup: User Info: Serial, xrefs: 004692D9
                                                                  • %s\%s_is1, xrefs: 00469171
                                                                  • Inno Setup: No Icons, xrefs: 004691DF
                                                                  • Inno Setup: User Info: Organization, xrefs: 004692C6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                  • API String ID: 47109696-1093091907
                                                                  • Opcode ID: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                  • Instruction ID: 061cd232f3236ea8aa9d1be5d6e88d15b117e94232a8cb9589ebe07a9024ca8b
                                                                  • Opcode Fuzzy Hash: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                                  • Instruction Fuzzy Hash: 2451A530A007049BCB11DB65D991BDEB7F9EF49304F5084BAE841A7391E778AE05CB59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1944 47cb30-47cb86 call 42c40c call 4035c0 call 47c7a8 call 4525c4 1953 47cb92-47cba1 call 4525c4 1944->1953 1954 47cb88-47cb8d call 453330 1944->1954 1958 47cba3-47cba9 1953->1958 1959 47cbbb-47cbc1 1953->1959 1954->1953 1960 47cbcb-47cbd3 call 403494 1958->1960 1961 47cbab-47cbb1 1958->1961 1962 47cbc3-47cbc9 1959->1962 1963 47cbd8-47cc00 call 42e3a4 * 2 1959->1963 1960->1963 1961->1959 1966 47cbb3-47cbb9 1961->1966 1962->1960 1962->1963 1970 47cc27-47cc41 GetProcAddress 1963->1970 1971 47cc02-47cc22 call 4078fc call 453330 1963->1971 1966->1959 1966->1960 1973 47cc43-47cc48 call 453330 1970->1973 1974 47cc4d-47cc6a call 403400 * 2 1970->1974 1971->1970 1973->1974
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(74A90000,SHGetFolderPathA), ref: 0047CC32
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: -rI$Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                  • API String ID: 190572456-1821436788
                                                                  • Opcode ID: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                  • Instruction ID: 6634b889f1a60bd4549a24dd6789ad2f54a0d6468ac2a8038bb9781f42ef23c6
                                                                  • Opcode Fuzzy Hash: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                                  • Instruction Fuzzy Hash: 8531E970A00109DFCF11EFA9D9D29EEB7B5EB44304B60847BE808E7241D738AE458B6D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1982 406334-40634e GetModuleHandleA GetProcAddress 1983 406350 1982->1983 1984 406357-406364 GetProcAddress 1982->1984 1983->1984 1985 406366 1984->1985 1986 40636d-40637a GetProcAddress 1984->1986 1985->1986 1987 406380-406381 1986->1987 1988 40637c-40637e SetProcessDEPPolicy 1986->1988 1988->1987
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                  • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                  • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                  • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModulePolicyProcess
                                                                  • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                  • API String ID: 3256987805-3653653586
                                                                  • Opcode ID: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                  • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                                  • Opcode Fuzzy Hash: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                                  • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2618 423884-42388e 2619 4239b7-4239bb 2618->2619 2620 423894-4238b6 call 41f3d4 GetClassInfoA 2618->2620 2623 4238e7-4238f0 GetSystemMetrics 2620->2623 2624 4238b8-4238cf RegisterClassA 2620->2624 2626 4238f2 2623->2626 2627 4238f5-4238ff GetSystemMetrics 2623->2627 2624->2623 2625 4238d1-4238e2 call 408cc4 call 40311c 2624->2625 2625->2623 2626->2627 2629 423901 2627->2629 2630 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2627->2630 2629->2630 2641 423962-423975 call 424188 SendMessageA 2630->2641 2642 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2630->2642 2641->2642 2642->2619 2644 4239aa-4239b2 DeleteMenu 2642->2644 2644->2619
                                                                  APIs
                                                                    • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                  • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                  • RegisterClassA.USER32(00499630), ref: 004238C7
                                                                  • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                  • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                  • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                                  • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                                  • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                  • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                  • String ID:
                                                                  • API String ID: 183575631-0
                                                                  • Opcode ID: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                  • Instruction ID: c8b20579a229f032ee7a03b4d787949f367ffe63dd75f0d430c9c3a529dbdbac
                                                                  • Opcode Fuzzy Hash: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                                  • Instruction Fuzzy Hash: 813172B17402006AEB10AF65AC82F6B36989B14308F10017BFA40AE2D3C6BDDD40876D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2646 4674ec-467596 call 41462c call 41464c call 41462c call 41464c SHGetFileInfo 2655 4675cb-4675d6 call 478d20 2646->2655 2656 467598-46759f 2646->2656 2661 467627-46763a call 47cff4 2655->2661 2662 4675d8-46761d call 42c40c call 40357c call 403738 ExtractIconA call 46742c 2655->2662 2656->2655 2657 4675a1-4675c6 ExtractIconA call 46742c 2656->2657 2657->2655 2667 46763c-467646 call 47cff4 2661->2667 2668 46764b-46764f 2661->2668 2683 467622 2662->2683 2667->2668 2671 467651-467674 call 403738 SHGetFileInfo 2668->2671 2672 4676a9-4676dd call 403400 * 2 2668->2672 2671->2672 2681 467676-46767d 2671->2681 2681->2672 2685 46767f-4676a4 ExtractIconA call 46742c 2681->2685 2683->2672 2685->2672
                                                                  APIs
                                                                  • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                    • Part of subcall function 0046742C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004674C4
                                                                    • Part of subcall function 0046742C: DestroyCursor.USER32(00000000), ref: 004674DA
                                                                  • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                  • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046766D
                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467693
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                  • String ID: c:\directory$k H$shell32.dll
                                                                  • API String ID: 3376378930-433663191
                                                                  • Opcode ID: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                  • Instruction ID: 265839c963417482dd86c951db209f81288bb0a388fd09f062db7983cc26d63d
                                                                  • Opcode Fuzzy Hash: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                                  • Instruction Fuzzy Hash: B2516070604604AFDB10EF69CD89FDFB7E8EB48318F1081A6F9049B391D6399E81CA59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2688 42f570-42f57a 2689 42f584-42f5c1 call 402b30 GetActiveWindow GetFocus call 41eeb4 2688->2689 2690 42f57c-42f57f call 402d30 2688->2690 2696 42f5d3-42f5db 2689->2696 2697 42f5c3-42f5cd RegisterClassA 2689->2697 2690->2689 2698 42f662-42f67e SetFocus call 403400 2696->2698 2699 42f5e1-42f612 CreateWindowExA 2696->2699 2697->2696 2699->2698 2700 42f614-42f658 call 42428c call 403738 CreateWindowExA 2699->2700 2700->2698 2707 42f65a-42f65d ShowWindow 2700->2707 2707->2698
                                                                  APIs
                                                                  • GetActiveWindow.USER32 ref: 0042F59F
                                                                  • GetFocus.USER32 ref: 0042F5A7
                                                                  • RegisterClassA.USER32(004997AC), ref: 0042F5C8
                                                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F69C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F606
                                                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F64C
                                                                  • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F65D
                                                                  • SetFocus.USER32(00000000,00000000,0042F67F,?,?,?,00000001,00000000,?,00458696,00000000,0049B628), ref: 0042F664
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                  • String ID: TWindowDisabler-Window
                                                                  • API String ID: 3167913817-1824977358
                                                                  • Opcode ID: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                  • Instruction ID: 092f1afd63313efa57bcf667ad1f00c9caddf595d34af2871f870ebe591ae418
                                                                  • Opcode Fuzzy Hash: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                                  • Instruction Fuzzy Hash: 20219F70740710BAE710EF62AD03F1A76A8EB04B04FA1413AF504AB2D1D7B96D5586ED
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                  • API String ID: 1646373207-2130885113
                                                                  • Opcode ID: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                  • Instruction ID: 5e931287d6eebe3694b70f0ad3549e6df422da746536320e83a51589c54bb73f
                                                                  • Opcode Fuzzy Hash: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                                  • Instruction Fuzzy Hash: 5B017570240B45AFD711AF73AD02F167658E705B57F6044BBFC0096286D77C8A088EAD
                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C893
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C89C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                                  • API String ID: 1375471231-1421604804
                                                                  • Opcode ID: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                  • Instruction ID: 2e7cf1fa8793a22cdcb7cccf6aa375e82942df810c5d1ff78a46bc34c798803d
                                                                  • Opcode Fuzzy Hash: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                                  • Instruction Fuzzy Hash: 65411474A001099BDB00EFA5D8C2ADEB7B9EB44309F50857BE91477392DB389E058B69
                                                                  APIs
                                                                  • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430958
                                                                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430967
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00430981
                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 004309A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                  • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                  • API String ID: 4130936913-2943970505
                                                                  • Opcode ID: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                  • Instruction ID: fe08fc0df2a0eca0a869f0df0621173a2940aa0bc2523ddfe777e35bb070d714
                                                                  • Opcode Fuzzy Hash: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                                  • Instruction Fuzzy Hash: 30F082B0958340CEE300EB25994271A7BE0EF58318F00467FF498A63E2D7399900CB5F
                                                                  APIs
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 00472591
                                                                  • FindClose.KERNEL32(000000FF,004725BC,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004725AF
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 004726B3
                                                                  • FindClose.KERNEL32(000000FF,004726DE,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004726D1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileNext
                                                                  • String ID: "*G$"*G
                                                                  • API String ID: 2066263336-450946878
                                                                  • Opcode ID: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                  • Instruction ID: 3872decae14ce2498a692a517acaa1cf84d86a609609514027ee2c14d85ef847
                                                                  • Opcode Fuzzy Hash: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                                  • Instruction Fuzzy Hash: 6CB13E7490424DAFCF11DFA5C981ADEBBB9FF49304F5081AAE808B3251D7789A46CF58
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218,00000000), ref: 004551A6
                                                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218), ref: 004551B3
                                                                    • Part of subcall function 00454F68: WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                    • Part of subcall function 00454F68: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                    • Part of subcall function 00454F68: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                    • Part of subcall function 00454F68: CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                  • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                  • API String ID: 854858120-615399546
                                                                  • Opcode ID: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                  • Instruction ID: 314af404618b4f06b129018ed763823481dfe4f790e250d6c958622b2bfe97d6
                                                                  • Opcode Fuzzy Hash: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                                  • Instruction Fuzzy Hash: 12515A30A0074DABDB11EF95C892BEEBBB9AF44705F50407BB804B7282D7785A49CB59
                                                                  APIs
                                                                  • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                  • OemToCharA.USER32(?,?), ref: 0042376C
                                                                  • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Char$FileIconLoadLowerModuleName
                                                                  • String ID: 2$MAINICON
                                                                  • API String ID: 3935243913-3181700818
                                                                  • Opcode ID: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                  • Instruction ID: fd9f9c5161a85cdd37c149357dc6ae372d2e201a3957992c444bec056041847b
                                                                  • Opcode Fuzzy Hash: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                                  • Instruction Fuzzy Hash: 89319270A042549ADF14EF2998857C67BE8AF14308F4441BAE844DB393D7BED988CB99
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                    • Part of subcall function 004230D8: 73E9A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                    • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                    • Part of subcall function 004230D8: 73EA4620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                    • Part of subcall function 004230D8: 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                    • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                    • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                    • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                    • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                    • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                    • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                    • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                    • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A4620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                  • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                  • API String ID: 1580766901-2767913252
                                                                  • Opcode ID: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                  • Instruction ID: 147b0fd3ac44816fa50e213e98ef70cab9cb63b371fef283777c7ccc396f8742
                                                                  • Opcode Fuzzy Hash: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                                  • Instruction Fuzzy Hash: BB112EB06142409AC740FF76A94265A7BE1DB64318F40843FF448EB2D1DB7D99448B5F
                                                                  APIs
                                                                  • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                  • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                  • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$Prop
                                                                  • String ID:
                                                                  • API String ID: 3887896539-0
                                                                  • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                  • Instruction ID: 955d73ee8c9e489f8eb805393a0cdbf9fe7b6d9765079e051d97cf620cdedb95
                                                                  • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                                  • Instruction Fuzzy Hash: D811C975500248BFDB00DF9DDC84EDA3BE8EB19364F144666B918DB2A1D738DD908BA8
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045585B,?,00000000,0045589B), ref: 004557A1
                                                                  Strings
                                                                  • WININIT.INI, xrefs: 004557D0
                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455724
                                                                  • PendingFileRenameOperations, xrefs: 00455740
                                                                  • PendingFileRenameOperations2, xrefs: 00455770
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                  • API String ID: 47109696-2199428270
                                                                  • Opcode ID: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                  • Instruction ID: 5ff55985f0d79b0cf99ef6a0ef0ae12f56fe6c83aec1de8438bfb9543cdeefde
                                                                  • Opcode Fuzzy Hash: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                                  • Instruction Fuzzy Hash: BB519670E006089FDB10FF61DC51AEEB7B9EF45305F50857BE804A7292DB7CAA49CA58
                                                                  APIs
                                                                  • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                  • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                  • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnumLongWindows
                                                                  • String ID: lAB
                                                                  • API String ID: 4191631535-3476862382
                                                                  • Opcode ID: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                  • Instruction ID: 20c146af1fa2ebf8fe73d6cd857ce812a249192cdefe4c29475ac4fba41381ea
                                                                  • Opcode Fuzzy Hash: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                                  • Instruction Fuzzy Hash: 4E115E70700610ABDB109F28DD85F6A77E8EB04725F50026AF9A49B2E7C378ED40CB59
                                                                  APIs
                                                                  • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,0049722D), ref: 0042DE7B
                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressDeleteHandleModuleProc
                                                                  • String ID: RegDeleteKeyExA$advapi32.dll
                                                                  • API String ID: 588496660-1846899949
                                                                  • Opcode ID: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                  • Instruction ID: 51feda2b41882886fdb541a0ee71ee95ad591444612597d61ea777cd3c773b46
                                                                  • Opcode Fuzzy Hash: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                                  • Instruction Fuzzy Hash: 3EE06DB1B41B30AAD72032A57C8AB932629DB75326F658537F005AE1D183FC2C50CE9D
                                                                  Strings
                                                                  • PrepareToInstall failed: %s, xrefs: 0046C14B
                                                                  • Need to restart Windows? %s, xrefs: 0046C172
                                                                  • NextButtonClick, xrefs: 0046BF84
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                  • API String ID: 0-2329492092
                                                                  • Opcode ID: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                  • Instruction ID: 1202268df95ceb0eead913a0caf14b6b564ec17a2e6689a58d7256d675820d07
                                                                  • Opcode Fuzzy Hash: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                                  • Instruction Fuzzy Hash: 64C16D34A04208DFCB00DB98C9D5AEE77B5EF05304F1444B7E840AB362D778AE41DBAA
                                                                  APIs
                                                                  • SetActiveWindow.USER32(?,?,00000000,00482E54), ref: 00482C30
                                                                  • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482CC5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveChangeNotifyWindow
                                                                  • String ID: $Need to restart Windows? %s
                                                                  • API String ID: 1160245247-4200181552
                                                                  • Opcode ID: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                  • Instruction ID: 8ca071c16d970d9f92bb59f1fa37784b4b8a51c549d6f2244aaf7164950ab745
                                                                  • Opcode Fuzzy Hash: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                                  • Instruction Fuzzy Hash: 2191B4346042458FDB10EB69D9C5BAD77F4AF59308F0084BBE8009B3A2CBB8AD05CB5D
                                                                  APIs
                                                                    • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                  • GetLastError.KERNEL32(00000000,0046FF81,?,?,0049C1D0,00000000), ref: 0046FE5E
                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FED8
                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FEFD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                  • String ID: Creating directory: %s
                                                                  • API String ID: 2451617938-483064649
                                                                  • Opcode ID: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                  • Instruction ID: bdf8a9d00633064e3922ce557b3b2562df44373322d6b4000fae74d311730630
                                                                  • Opcode Fuzzy Hash: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                                  • Instruction Fuzzy Hash: AE513F74A00248ABDB04DFA5D582BDEB7F5AF09304F50817BE850B7382D7786E08CB69
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E6E
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F34), ref: 00454ED8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressByteCharMultiProcWide
                                                                  • String ID: SfcIsFileProtected$sfc.dll
                                                                  • API String ID: 2508298434-591603554
                                                                  • Opcode ID: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                  • Instruction ID: 1a17c74f1ac94ad93f17d87dc1e08c5ddb540f3824a5df31749c88666692504e
                                                                  • Opcode Fuzzy Hash: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                                  • Instruction Fuzzy Hash: 6A41A630A042189BEB10DB69DC85B9D77B8AB4430DF5081B7E908A7293D7785F88CF59
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B411
                                                                  • SelectObject.GDI32(?,00000000), ref: 0044B434
                                                                  • 73E9A480.USER32(00000000,?,0044B474,00000000,0044B46D,?,00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B467
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: A480A570ObjectSelect
                                                                  • String ID: k H
                                                                  • API String ID: 1230475511-1447039187
                                                                  • Opcode ID: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                  • Instruction ID: b5872ed9d16ca79c431bae9e7544c15e8f802733be01f045b529408bc148fe47
                                                                  • Opcode Fuzzy Hash: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                                  • Instruction Fuzzy Hash: 6D217470A04248AFEB15DFA5C851B9EBBB9EB49304F51807AF504E7282D77CD940CB69
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B15C,?,k H,?,?), ref: 0044B12E
                                                                  • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B141
                                                                  • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B175
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: DrawText$ByteCharMultiWide
                                                                  • String ID: k H
                                                                  • API String ID: 65125430-1447039187
                                                                  • Opcode ID: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                  • Instruction ID: 2dd5a1fcad8022b5ecdd36c3e8438632fadfe976456551c737a9f8dd3ea145e1
                                                                  • Opcode Fuzzy Hash: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                                  • Instruction Fuzzy Hash: A3110BB6700604BFE700DB5A9C91D6F77ECD749750F10413BF504D72D0C6389E018668
                                                                  APIs
                                                                  • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                  • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                  • String ID: SHAutoComplete$shlwapi.dll
                                                                  • API String ID: 395431579-1506664499
                                                                  • Opcode ID: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                  • Instruction ID: a33720f3aac7210c00664dabe11b621525643aa7ae94b1405928deeb439ddd4e
                                                                  • Opcode Fuzzy Hash: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                                  • Instruction Fuzzy Hash: 1611A331B00318BBDB11EB62ED81B8E7BA8DB55704F90407BF400A6691DBB8AE05C65D
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(?,00455A67,?,00000001,00000000), ref: 00455A5A
                                                                  Strings
                                                                  • PendingFileRenameOperations2, xrefs: 00455A3B
                                                                  • PendingFileRenameOperations, xrefs: 00455A2C
                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A08
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                  • API String ID: 47109696-2115312317
                                                                  • Opcode ID: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                  • Instruction ID: a84b10804161a04e9b7828e63518c67389a2277fb2d5ef6d9c2d81c30e1ce2e0
                                                                  • Opcode Fuzzy Hash: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                                  • Instruction Fuzzy Hash: 49F09671714A04BFEB05D665DC72E3A739CD744B15FA1446BF800C6682DA7DBE04951C
                                                                  APIs
                                                                  • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?,00000000), ref: 0047F8AA
                                                                  • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?), ref: 0047F8B7
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D), ref: 0047F9AC
                                                                  • FindClose.KERNEL32(000000FF,0047F9D7,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?), ref: 0047F9CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileNext
                                                                  • String ID:
                                                                  • API String ID: 2066263336-0
                                                                  • Opcode ID: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                  • Instruction ID: d4c1b09f85a1e3ce5f066f5119f691750f955bf6e0a6470712ab8dbd39f482a6
                                                                  • Opcode Fuzzy Hash: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                                  • Instruction Fuzzy Hash: 80513E71A00648AFCB10EF65CC45ADEB7B8AB88315F1085BAA818E7351D7389F49CF59
                                                                  APIs
                                                                  • GetMenu.USER32(00000000), ref: 00421371
                                                                  • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                  • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                  • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Menu
                                                                  • String ID:
                                                                  • API String ID: 3711407533-0
                                                                  • Opcode ID: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                  • Instruction ID: 7918b5ac66a49b7c70f092078a7f06842b1ce09055eaa5e04548cec6233339c2
                                                                  • Opcode Fuzzy Hash: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                                  • Instruction Fuzzy Hash: 7D41A13070025447EB20EA79A9857AB26969F69318F4805BFFC44DF3A3CA7DDC45839D
                                                                  APIs
                                                                  • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                  • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                  • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Color$CallMessageProcSendTextWindow
                                                                  • String ID:
                                                                  • API String ID: 601730667-0
                                                                  • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                  • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                                  • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                                  • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                  • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                  • 73EA4620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                  • 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: A4620A480A570EnumFonts
                                                                  • String ID:
                                                                  • API String ID: 178811091-0
                                                                  • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                  • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                                  • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                                  • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                                  APIs
                                                                    • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                  • FlushFileBuffers.KERNEL32(?), ref: 0045C7FD
                                                                  Strings
                                                                  • EndOffset range exceeded, xrefs: 0045C731
                                                                  • NumRecs range exceeded, xrefs: 0045C6FA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: File$BuffersFlush
                                                                  • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                  • API String ID: 3593489403-659731555
                                                                  • Opcode ID: 90e5250bcff3ed4b7b339ef7eb4c65d9cfede30e5b4b48ed32eefd4799847540
                                                                  • Instruction ID: 42c6ccb15965a4bc01c0ab80d29458e35b3cecf9486565f2d0e9c4cbdba5a9bf
                                                                  • Opcode Fuzzy Hash: 90e5250bcff3ed4b7b339ef7eb4c65d9cfede30e5b4b48ed32eefd4799847540
                                                                  • Instruction Fuzzy Hash: A5617134A002988FDB24DF25C891AD9B7B5EF49305F0084DAED89AB352D774AEC9CF54
                                                                  APIs
                                                                    • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                    • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                    • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                    • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                    • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                    • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                    • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                    • Part of subcall function 00409B88: 6F9C1CD0.COMCTL32(0049859A), ref: 00409B88
                                                                    • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                                    • Part of subcall function 00419050: GetVersion.KERNEL32(004985AE), ref: 00419050
                                                                    • Part of subcall function 0044F754: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                    • Part of subcall function 0044F754: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                    • Part of subcall function 0044FBFC: GetVersionExA.KERNEL32(0049B790,004985C7), ref: 0044FC0B
                                                                    • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                    • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                    • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                    • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                    • Part of subcall function 00456EEC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                    • Part of subcall function 00464960: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                    • Part of subcall function 00464960: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                    • Part of subcall function 0046D098: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                    • Part of subcall function 00478B3C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                    • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                    • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                    • Part of subcall function 00495584: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049559D
                                                                  • SetErrorMode.KERNEL32(00000001,00000000,0049863C), ref: 0049860E
                                                                    • Part of subcall function 00498338: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                    • Part of subcall function 00498338: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                    • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                  • ShowWindow.USER32(?,00000005,00000000,0049863C), ref: 0049866F
                                                                    • Part of subcall function 00482050: SetActiveWindow.USER32(?), ref: 004820FE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                  • String ID: Setup
                                                                  • API String ID: 504348408-3839654196
                                                                  • Opcode ID: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                  • Instruction ID: d131c851e578025af209eb9e9c2d0e6aaf1cfb04eb4cc82699b843ce611002a7
                                                                  • Opcode Fuzzy Hash: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                                  • Instruction Fuzzy Hash: 5C31D4702046409ED601BBBBED5352E3B98EB8A718B61487FF804D6553CE3D6C148A3E
                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A56
                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A5F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID: .tmp
                                                                  • API String ID: 1375471231-2986845003
                                                                  • Opcode ID: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                  • Instruction ID: fcbeb811eea92760dd82faa40bdacdd366465f8a5342b7af386d3ee3900427bd
                                                                  • Opcode Fuzzy Hash: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                                  • Instruction Fuzzy Hash: 5A213375A00208ABDB01EFA1C8429DEB7B9EB48305F50457BE801B7342DA789F058AA5
                                                                  APIs
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C596,00000000,0047C5AC,?,?,?,?,00000000), ref: 0047C372
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID: RegisteredOrganization$RegisteredOwner
                                                                  • API String ID: 3535843008-1113070880
                                                                  • Opcode ID: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                  • Instruction ID: cd6b81515cbcb541a42d20c803a6709c30f964b406f28b15d8fe69fce277d2ff
                                                                  • Opcode Fuzzy Hash: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                                  • Instruction Fuzzy Hash: 41F09030704204ABEB00D669ECD2BAA33A99746304F60C03FA9088B392D6799E01CB5C
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754E1
                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754F8
                                                                    • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateErrorFileHandleLast
                                                                  • String ID: CreateFile
                                                                  • API String ID: 2528220319-823142352
                                                                  • Opcode ID: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                  • Instruction ID: 40e201e46ebb19b1d9bf90fbf766f72b309683208074062896c4944ddf319cda
                                                                  • Opcode Fuzzy Hash: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                                  • Instruction Fuzzy Hash: CDE065702403447FDA10F769CCC6F4577889B14729F10C155B5446F3D2C5B9EC408628
                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID: System\CurrentControlSet\Control\Windows$c6H
                                                                  • API String ID: 71445658-1548894351
                                                                  • Opcode ID: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                  • Instruction ID: b14c86e398362f8621ba381b59967aff518ca924b2daa5b46ce173f8349262a2
                                                                  • Opcode Fuzzy Hash: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                                  • Instruction Fuzzy Hash: BFD0C772950128BBDB00DA89DC41DFB775DDB15760F45441BFD049B141C1B4EC5197F8
                                                                  APIs
                                                                    • Part of subcall function 00456E7C: CoInitialize.OLE32(00000000), ref: 00456E82
                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                  • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                  • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                  • API String ID: 2906209438-2320870614
                                                                  • Opcode ID: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                  • Instruction ID: 6d1f0b9ea2f83cf17b9d56af39d37ffc4890966232cc80b75afa5f9be50b51f8
                                                                  • Opcode Fuzzy Hash: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                                  • Instruction Fuzzy Hash: 97C04CA1B4169096CB00B7FAA54361F2414DB5075FB96C07FBD40BB687CE7D8848AA2E
                                                                  APIs
                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                  • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressErrorLibraryLoadModeProc
                                                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                  • API String ID: 2492108670-2683653824
                                                                  • Opcode ID: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                  • Instruction ID: 608de25eae135e4754017d8cf95b07e3007941af04aa8fd5541e4ba3120ba520
                                                                  • Opcode Fuzzy Hash: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                                  • Instruction Fuzzy Hash: 69B092E0F056008ACF00A7F6984260A10059B8071DF90807B7440BB395EA3E840AAB6F
                                                                  APIs
                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448719), ref: 0044865C
                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID:
                                                                  • API String ID: 2574300362-0
                                                                  • Opcode ID: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                  • Instruction ID: bcb50df029510264ac3c8269deb9aca16d778d72fab4f9fb4f479d94b6d7f3fe
                                                                  • Opcode Fuzzy Hash: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                                  • Instruction Fuzzy Hash: 09514170A00105AFDB40EFA5C491A9EBBF9EB54315F11817EA414BB392DA389E05CB99
                                                                  APIs
                                                                  • GetSystemMenu.USER32(00000000,00000000,00000000,0048183C), ref: 004817D4
                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004817E5
                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004817FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Append$System
                                                                  • String ID:
                                                                  • API String ID: 1489644407-0
                                                                  • Opcode ID: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                  • Instruction ID: b36482c1273671328963914ac1a7ecaae55131090c894365c145815d0470a156
                                                                  • Opcode Fuzzy Hash: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                                  • Instruction Fuzzy Hash: 02318E307043445AD721FB359D82BAE3A989B15318F54593FB900AA3E3CA7C9C4A87AD
                                                                  APIs
                                                                  • 751C1520.VERSION(00000000,?,?,?,004972D0), ref: 0045251C
                                                                  • 751C1500.VERSION(00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452549
                                                                  • 751C1540.VERSION(?,004525C0,?,?,00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452563
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: C1500C1520C1540
                                                                  • String ID:
                                                                  • API String ID: 1315064709-0
                                                                  • Opcode ID: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                  • Instruction ID: b47a7e64509d5cca070909842564d4f4e78a1d1ae8fea26b0cdd83eea50adb12
                                                                  • Opcode Fuzzy Hash: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                                  • Instruction Fuzzy Hash: 6B218371A00148AFDB01DAA989519AFB7FCEB4A300F55447BFC00E3342E6B99E04CB65
                                                                  APIs
                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                  • TranslateMessage.USER32(?), ref: 0042449F
                                                                  • DispatchMessageA.USER32(?), ref: 004244A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Message$DispatchPeekTranslate
                                                                  • String ID:
                                                                  • API String ID: 4217535847-0
                                                                  • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                  • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                                  • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                                  • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                                  APIs
                                                                  • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                  • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Prop$Window
                                                                  • String ID:
                                                                  • API String ID: 3363284559-0
                                                                  • Opcode ID: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                  • Instruction ID: 2262f6f032fbfc8c948eb6af5e1566575da4c35a9ecfa624f63ddadf83d7b404
                                                                  • Opcode Fuzzy Hash: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                                  • Instruction Fuzzy Hash: E3F0B271701210ABD710AB599C85FA632DCAB09719F160176BD09EF286C778DC40C7A8
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                  • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                  • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnableEnabledVisible
                                                                  • String ID:
                                                                  • API String ID: 3234591441-0
                                                                  • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                  • Instruction ID: eab114e884733e02e348d5fb54c1eeaedaab2d2a8f53f62e6f3f1b5b82b3488b
                                                                  • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                                  • Instruction Fuzzy Hash: 90E0EDB9100300AAE711AB2BEC81A57769CBB94314F45843BAC099B293DA3EDC409B78
                                                                  APIs
                                                                  • SetActiveWindow.USER32(?), ref: 0046A378
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveWindow
                                                                  • String ID: PrepareToInstall
                                                                  • API String ID: 2558294473-1101760603
                                                                  • Opcode ID: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                  • Instruction ID: 163d609461ff3b9580316b21a780dec1cd9204125e937a74b025edb926540d27
                                                                  • Opcode Fuzzy Hash: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                                  • Instruction Fuzzy Hash: 90A10A34A00109DFCB00EB99D985EEEB7F5AF88304F1580B6E404AB362D738AE45DF59
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /:*?"<>|
                                                                  • API String ID: 0-4078764451
                                                                  • Opcode ID: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                  • Instruction ID: b706238f5af82f8a54f925a22e06db4ee79b372672e861a4edd763b161806009
                                                                  • Opcode Fuzzy Hash: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                                  • Instruction Fuzzy Hash: 6F7197B0B44244AADB20E766DCC2BEE77A19F41704F108167F5807B392E7B99D45878E
                                                                  APIs
                                                                  • SetActiveWindow.USER32(?), ref: 004820FE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveWindow
                                                                  • String ID: InitializeWizard
                                                                  • API String ID: 2558294473-2356795471
                                                                  • Opcode ID: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                  • Instruction ID: b8891c381381d1a0014b65a4ce29d1dfbbdf9d421e77ac889de6892087eb3363
                                                                  • Opcode Fuzzy Hash: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                                  • Instruction Fuzzy Hash: BE118234205204DFD711EBA5FE96B2977E4EB55314F20143BE5008B3A1DA796C50CB6D
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C472,00000000,0047C5AC), ref: 0047C271
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C241
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                  • API String ID: 47109696-1019749484
                                                                  • Opcode ID: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                  • Instruction ID: 70811ca8e083c9a3dbfae153db117623eb743e792d78c4ccda021ebaf15ccddc
                                                                  • Opcode Fuzzy Hash: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                                  • Instruction Fuzzy Hash: 8EF08931B0411467DA00A5DA5C82B9E56DD8B55758F20407FF508EB253D9B99D02036C
                                                                  APIs
                                                                  • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                  Strings
                                                                  • Inno Setup: Setup Version, xrefs: 0046F10D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Value
                                                                  • String ID: Inno Setup: Setup Version
                                                                  • API String ID: 3702945584-4166306022
                                                                  • Opcode ID: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                  • Instruction ID: 253732d940e31991125f8b939195b5ca02eb4333684dc2ddbbcc15e62aa31341
                                                                  • Opcode Fuzzy Hash: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                                  • Instruction Fuzzy Hash: 3BE06D713012047FD710AA6B9C85F5BBADDDF993A5F10403AB908DB392D578DD4081A8
                                                                  APIs
                                                                  • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Value
                                                                  • String ID: NoModify
                                                                  • API String ID: 3702945584-1699962838
                                                                  • Opcode ID: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                  • Instruction ID: dfbc78ba79a393f528aadc4bccb3a1e1d52346a2df28baf9fde3d1272b39f611
                                                                  • Opcode Fuzzy Hash: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                                  • Instruction Fuzzy Hash: D8E04FB4604304BFEB04DB55DD4AF6B77ECDB48750F10415ABA04DB281E674EE00C668
                                                                  APIs
                                                                  • GetACP.KERNEL32(?,?,00000001,00000000,0047E25F,?,-0000001A,004800D8,-00000010,?,00000004,0000001B,00000000,00480425,?,0045DECC), ref: 0047DFF6
                                                                    • Part of subcall function 0042E32C: 73E9A570.USER32(00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0042E33B
                                                                    • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                                    • Part of subcall function 0042E32C: 73E9A480.USER32(00000000,?,0042E38B,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E37E
                                                                  • SendNotifyMessageA.USER32(000203DC,00000496,00002711,-00000001), ref: 0047E1C6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: A480A570EnumFontsMessageNotifySend
                                                                  • String ID:
                                                                  • API String ID: 2685184028-0
                                                                  • Opcode ID: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                  • Instruction ID: 0ea8e5e95b90053dcc80dc26f94e29a170662e2b3e10ca2db4d961c35622b213
                                                                  • Opcode Fuzzy Hash: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                                  • Instruction Fuzzy Hash: 2651A6746001508BD710FF27D9C16963799EB88308B90C6BBA8089F367C77CDD068B9D
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID:
                                                                  • API String ID: 3660427363-0
                                                                  • Opcode ID: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                  • Instruction ID: 0afc69acb925fd444515a6cbe8b6240f093bd173affdd4b5aabebdcedbe93bcc
                                                                  • Opcode Fuzzy Hash: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                                  • Instruction Fuzzy Hash: E0414F71E00529ABDB11DF95D881BAFB7B8AB00714F90846AE800F7241D778AE00CBA9
                                                                  APIs
                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                  • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseEnum
                                                                  • String ID:
                                                                  • API String ID: 2818636725-0
                                                                  • Opcode ID: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                  • Instruction ID: 2fe76ac110d60e281b9c8dcd8425dafac1d5c60e45ccd2ae84570cbaedcb928d
                                                                  • Opcode Fuzzy Hash: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                                  • Instruction Fuzzy Hash: 52319170F04258AEDB11DFA2DD82BAEB7B9EB48304F91407BE501E7281D6785A01CA2D
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452828
                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452830
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 2919029540-0
                                                                  • Opcode ID: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                  • Instruction ID: 3ad6dec6d32dc5e6ab031f6e5884ad9a987dc2d9ff381773f4694f698bcb58b9
                                                                  • Opcode Fuzzy Hash: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                                  • Instruction Fuzzy Hash: D3117972600208AF8B00DEADDD41DABB7ECEB4E310B10456BFD08E3201D678AE148BA4
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                                  • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindFree
                                                                  • String ID:
                                                                  • API String ID: 4097029671-0
                                                                  • Opcode ID: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                  • Instruction ID: 22447e907da962d806d3eb032de74b702d5affa043e15eb070a4a3d902aeafed
                                                                  • Opcode Fuzzy Hash: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                                  • Instruction Fuzzy Hash: 0001DF71300604AFD710FF69DC92E1B77A9DB8A718711807AF500AB7D0DA79AC0096AD
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                  • 73EA5940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: A5940CurrentThread
                                                                  • String ID:
                                                                  • API String ID: 2589350566-0
                                                                  • Opcode ID: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                  • Instruction ID: 3b2ca51acea6f31c20bceb620234c512699c69eae89bb1383ecfa3b3ac64bed2
                                                                  • Opcode Fuzzy Hash: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                                  • Instruction Fuzzy Hash: FD013976A04604BFDB06CF6BDC1195ABBE9E789720B22887BEC04D36A0E6355810DE18
                                                                  APIs
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CAE
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00452CD4), ref: 00452CB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastMove
                                                                  • String ID:
                                                                  • API String ID: 55378915-0
                                                                  • Opcode ID: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                  • Instruction ID: 8cb4f6990e07c72a34a39c3d349ee9eec810a974928c7dd1f8c60ebce1e721cc
                                                                  • Opcode Fuzzy Hash: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                                  • Instruction Fuzzy Hash: D5014971B00204BB8B11DF799D414AEB7ECEB4A32531045BBFC08E3243EAB84E048558
                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527BB), ref: 00452795
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,004527BB), ref: 0045279D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1375471231-0
                                                                  • Opcode ID: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                  • Instruction ID: 7517b5081c7c6af98826394809c6fe2d976c468da5ddf52a6f68070703836f12
                                                                  • Opcode Fuzzy Hash: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                                  • Instruction Fuzzy Hash: 40F0FC71A04704AFCF00DF759D4199EB7E8DB0E715B5049B7FC14E3242E7B94E1485A8
                                                                  APIs
                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                  • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CursorLoad
                                                                  • String ID:
                                                                  • API String ID: 3238433803-0
                                                                  • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                  • Instruction ID: c8375b04fab070422f53c3d6524130e38f027298e82d6ab835706982cf041ecc
                                                                  • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                                  • Instruction Fuzzy Hash: 0FF0A711704114AADA105D7E6CC0E2B7268DB91B36B6103BBFA3AD72D1C62E1D41457D
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLibraryLoadMode
                                                                  • String ID:
                                                                  • API String ID: 2987862817-0
                                                                  • Opcode ID: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                  • Instruction ID: 98bcbcc3e9aaf4c66058534b39987ccdd7eb12bd14468eaf88ad72af9e5505e3
                                                                  • Opcode Fuzzy Hash: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                                  • Instruction Fuzzy Hash: D5F05E70A14744BEDF119F779C6282ABAACE749B1179248B6F810A3691E67D48108928
                                                                  APIs
                                                                  • GetClassInfoA.USER32(00400000,?,?), ref: 004162F1
                                                                  • GetClassInfoA.USER32(00000000,?,?), ref: 00416301
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ClassInfo
                                                                  • String ID:
                                                                  • API String ID: 3534257612-0
                                                                  • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                  • Instruction ID: dc9e2acc6f173dd0cc3aa24d84b637cb0067f0ccc6b7cec6a0fcec59befe77f5
                                                                  • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                                  • Instruction Fuzzy Hash: 22E012B26015155ADB10DB999D81EE326DCDB09310B110167BE14CA246D764DD005BA4
                                                                  APIs
                                                                  • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 004508FA
                                                                  • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 00450902
                                                                    • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FilePointer
                                                                  • String ID:
                                                                  • API String ID: 1156039329-0
                                                                  • Opcode ID: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                  • Instruction ID: a22a311b57bf1dff13f45894218d9c0eaf9de3d8271a2984ee0ce7717fd7efee
                                                                  • Opcode Fuzzy Hash: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                                  • Instruction Fuzzy Hash: E0E012B53042059BFB00FA6599C1F3B63DCDB44315F00447AB984CF187D674CC155B29
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocLock
                                                                  • String ID:
                                                                  • API String ID: 15508794-0
                                                                  • Opcode ID: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                                  • Instruction ID: 0263706b80ae8aebac4b2aeda69df254121a1764ed820e2db5cbcbfbef09bb73
                                                                  • Opcode Fuzzy Hash: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                                  • Instruction Fuzzy Hash: 3D9002C4C10B01A4DC0432B24C0BC3F0C2CD8C072C3C0486F7018B6183883C8800083C
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 2087232378-0
                                                                  • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                  • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                  • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                  • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                                    • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                                    • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                  • String ID:
                                                                  • API String ID: 1658689577-0
                                                                  • Opcode ID: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                  • Instruction ID: ea6634d2ed8774f5e90a5a6f355d63bed973dafba18e0ec7d48b30ffe24ea089
                                                                  • Opcode Fuzzy Hash: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                                  • Instruction Fuzzy Hash: C4314375E001199BCF01DF95C8819EEB7B9FF84314F15857BE815AB286E738AE018B98
                                                                  APIs
                                                                  • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoScroll
                                                                  • String ID:
                                                                  • API String ID: 629608716-0
                                                                  • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                  • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                                  • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                                  • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                  APIs
                                                                    • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                    • Part of subcall function 0041EEB4: 73EA5940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                  • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C756,?,00000000,?,?,0046C968,?,00000000,0046C9DC), ref: 0046C73A
                                                                    • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                    • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$A5940CurrentEnablePathPrepareThreadWrite
                                                                  • String ID:
                                                                  • API String ID: 3104224314-0
                                                                  • Opcode ID: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                  • Instruction ID: 552ca42e7a4f22222615ff1de8f8c20df724e6475abae56b3c63f202feb1ec23
                                                                  • Opcode Fuzzy Hash: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                                  • Instruction Fuzzy Hash: 28F0E270248300FFEB059BB2EDD6B2577E8E319716F91043BF504866D0EA795D40C96E
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                  • Instruction ID: d0e136ad155d69288fc423feb27b218c22c44688115b59a91c3ffefc647f2292
                                                                  • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                  • Instruction Fuzzy Hash: F0F0FF70509209DBBB1CCF54D0919AF7B71EB59310F20806FE907877A0D6346A80D759
                                                                  APIs
                                                                  • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                  • Instruction ID: 39ad6e161323637dbb8254467e02d50acedd081d31d6b9d15e1adfc5f54150e8
                                                                  • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                  • Instruction Fuzzy Hash: 6EF02BB2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD220EC108BB0
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                  • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                  • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                  • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507F0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                  • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                  • Opcode Fuzzy Hash: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                                  • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A11,00000000,00452A32,?,00000000), ref: 0042CD07
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                  • Instruction ID: bebe06870d533199fa05ec681e6f815a7bc371a3e359dcca221b2f893a48d47d
                                                                  • Opcode Fuzzy Hash: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                                  • Instruction Fuzzy Hash: 0AE06571304308BFD701EB62EC92A5EBBECD749714B914476B400D7592D5B86E008458
                                                                  APIs
                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FormatMessage
                                                                  • String ID:
                                                                  • API String ID: 1306739567-0
                                                                  • Opcode ID: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                  • Instruction ID: 1e04b5e42f682bd3307758a00633d1e15c64123c11c882a5e2d093d9edca25ee
                                                                  • Opcode Fuzzy Hash: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                                  • Instruction Fuzzy Hash: E7E0D86178432126F23524166C43B7B110E43C0704FD080267A809F3D6D6EE9949425E
                                                                  APIs
                                                                  • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                  • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                  • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                  • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                  APIs
                                                                  • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                  • Instruction ID: 00bf656f3cc58d957e3fc120c7d975a7f6f089e768df8f95d2ce2a55afbcf34e
                                                                  • Opcode Fuzzy Hash: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                                  • Instruction Fuzzy Hash: 69E07EB2600119AF9B40DE8CDC81EEB37ADAB1D350F414016FA08E7200C274EC519BB4
                                                                  APIs
                                                                  • FindClose.KERNEL32(00000000,000000FF,00470C14,00000000,00471A10,?,00000000,00471A59,?,00000000,00471B92,?,00000000,?,00000000), ref: 00454BFA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFind
                                                                  • String ID:
                                                                  • API String ID: 1863332320-0
                                                                  • Opcode ID: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                  • Instruction ID: 3c3cb6916585ff7422749358fc170cdffb6a73b651657da6609ae8be1e4b77d0
                                                                  • Opcode Fuzzy Hash: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                                  • Instruction Fuzzy Hash: A7E065B0A056004BCB15DF3A858021A76D25FC5325F05C96AAC58CF397D63C84955656
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(004953B6,?,004953D8,?,?,00000000,004953B6,?,?), ref: 004146AB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                  • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                  • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                  • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                  • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                                  • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                                  • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                                  APIs
                                                                    • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                  • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                    • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoParametersSystem$ShowWindow
                                                                  • String ID:
                                                                  • API String ID: 3202724764-0
                                                                  • Opcode ID: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                  • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                                  • Opcode Fuzzy Hash: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                                  • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                                  APIs
                                                                  • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: TextWindow
                                                                  • String ID:
                                                                  • API String ID: 530164218-0
                                                                  • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                  • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                                  • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                                  • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,004515B7,00000000), ref: 0042CD3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                  • Instruction ID: 866207c2a99293721dc17515f5e31636ca325c5e587501d47fbe5ff4e718b97c
                                                                  • Opcode Fuzzy Hash: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                                  • Instruction Fuzzy Hash: 77C08CE03222001A9A20A6BD2CC950F06CC891437A3A41F77B439E72E2D23DD8162018
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                  • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                  • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                  • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                  • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                  • Opcode Fuzzy Hash: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                                  • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                  APIs
                                                                  • SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                    • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 734332943-0
                                                                  • Opcode ID: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                  • Instruction ID: d892f33e09ba9bc7304af59ed1bd982b4427bde6cd355302a364b0e8927efaaf
                                                                  • Opcode Fuzzy Hash: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                                  • Instruction Fuzzy Hash: 2DC04CA9300101879F00BAAE95D190663D85E583057504066B944CF207D668D8144A18
                                                                  APIs
                                                                  • SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectory
                                                                  • String ID:
                                                                  • API String ID: 1611563598-0
                                                                  • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                  • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                  • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                                  • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                  • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                  • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                  • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                  • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                  • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                                  • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                  • Instruction ID: 3a42617683b163d9d3e29dc322e321d1f787465d7b697eb1a78dfeb7447b1e7e
                                                                  • Opcode Fuzzy Hash: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                                  • Instruction Fuzzy Hash: CB518574E042099FEB01EFA9C892AAEBBF5EF49314F50417AE500E7351DB389D45CB98
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047DC20,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DBDA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 626452242-0
                                                                  • Opcode ID: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                  • Instruction ID: a4a2cf2857c8d8ea8b604d5a3bb359359cf50968c17c86877c7e7666634e0114
                                                                  • Opcode Fuzzy Hash: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                                  • Instruction Fuzzy Hash: 79519C30A04248AFDB20DF65D8C5BAABBB8EB18304F118077E804A73A1D778AD45CB59
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                  • Instruction ID: 6bd7adec2090487eae29abc1928bf57af59456791c97a49d6ef8c5917aacc84c
                                                                  • Opcode Fuzzy Hash: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                                  • Instruction Fuzzy Hash: 0E1148742007069BC710DF19D880B86FBE5EB98390B10C53BE9588B385D374E8558BA9
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,00453019), ref: 00452FFB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1452528299-0
                                                                  • Opcode ID: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                  • Instruction ID: 3702fe8876d82bde104835ae14f19b545f9b4323f369928b31ff8c7c86e788f0
                                                                  • Opcode Fuzzy Hash: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                                  • Instruction Fuzzy Hash: 32014C356043086A8B10CF69AC004AEFBE8DB4D7217108277FC14D3382DA744E0496E4
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00001860,00005863,00401973), ref: 00401766
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                  • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                  • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                  • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                  • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                  • Opcode Fuzzy Hash: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                  • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                  • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                  • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                  • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                  • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                  • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                  • API String ID: 2323315520-3614243559
                                                                  • Opcode ID: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                  • Instruction ID: d5058fc073e0ad59750b6b6eed82d26134d8568d962b0a84cfd108907e917b52
                                                                  • Opcode Fuzzy Hash: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                                  • Instruction Fuzzy Hash: 8D310DB2640700EBEB01EBB9AC86A663294F728724745093FB508DB192D77C5C49CB1C
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00458993
                                                                  • QueryPerformanceCounter.KERNEL32(02123858,00000000,00458C26,?,?,02123858,00000000,?,00459322,?,02123858,00000000), ref: 0045899C
                                                                  • GetSystemTimeAsFileTime.KERNEL32(02123858,02123858), ref: 004589A6
                                                                  • GetCurrentProcessId.KERNEL32(?,02123858,00000000,00458C26,?,?,02123858,00000000,?,00459322,?,02123858,00000000), ref: 004589AF
                                                                  • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458A25
                                                                  • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02123858,02123858), ref: 00458A33
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458A7B
                                                                  • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458BD1,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458AB4
                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458B5D
                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00458B93
                                                                  • CloseHandle.KERNEL32(000000FF,00458BD8,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458BCB
                                                                    • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                  • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                  • API String ID: 770386003-3271284199
                                                                  • Opcode ID: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                  • Instruction ID: 46381a2ef6f5f7687f8d932114089cfc0a3b3023078b53c1614b04e084b280c9
                                                                  • Opcode Fuzzy Hash: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                                  • Instruction Fuzzy Hash: 02711370A04348AEDB11DB69CC41B5EBBF8EB15705F1084BAB944FB282DB7859488B69
                                                                  APIs
                                                                    • Part of subcall function 0047828C: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02122BE0,?,?,?,02122BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                    • Part of subcall function 0047828C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                    • Part of subcall function 0047828C: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BE0,?,?,?,02122BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                    • Part of subcall function 0047828C: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BE0,?,?,?,02122BE0), ref: 004782E8
                                                                    • Part of subcall function 0047828C: CloseHandle.KERNEL32(00000000,?,?,?,02122BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                    • Part of subcall function 00478364: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004783F6,?,?,?,02122BE0,?,00478458,00000000,0047856E,?,?,-00000010,?), ref: 00478394
                                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004784A8
                                                                  • GetLastError.KERNEL32(00000000,0047856E,?,?,-00000010,?), ref: 004784B1
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004784FE
                                                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478522
                                                                  • CloseHandle.KERNEL32(00000000,00478553,00000000,00000000,000000FF,000000FF,00000000,0047854C,?,00000000,0047856E,?,?,-00000010,?), ref: 00478546
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                  • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                  • API String ID: 883996979-221126205
                                                                  • Opcode ID: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                  • Instruction ID: be90243bdd9c3757315ff9bbcfcad83cd6a8df60a98d136a70e83fac94f3d3e4
                                                                  • Opcode Fuzzy Hash: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                                  • Instruction Fuzzy Hash: E0314670A40609BEDB11EFAAD845ADEB6B8EF05314F50847FF518E7281DB7C89058B19
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                  • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendShowWindow
                                                                  • String ID:
                                                                  • API String ID: 1631623395-0
                                                                  • Opcode ID: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                  • Instruction ID: ac1ceeab966790095f9612ce7a7db5e594191b89627cdcc61fab65d1acc55ab9
                                                                  • Opcode Fuzzy Hash: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                                  • Instruction Fuzzy Hash: 79914071B04214BFD711EFA9DA86F9D77F4AB04314F5500BAF504AB3A2CB78AE409B58
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 004183A3
                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                  • GetWindowRect.USER32(?), ref: 004183DC
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                  • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                  • ScreenToClient.USER32(00000000), ref: 00418408
                                                                  • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                  • String ID: ,
                                                                  • API String ID: 2266315723-3772416878
                                                                  • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                  • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                                  • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                                  • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555FE
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455625
                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045562A
                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 0045563B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                  • String ID: SeShutdownPrivilege
                                                                  • API String ID: 107509674-3733053543
                                                                  • Opcode ID: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                  • Instruction ID: f0f78ca649e8ddc1473c2e21848b41e7847a09c75f53dffa28e6f5675cd8c776
                                                                  • Opcode Fuzzy Hash: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                                  • Instruction Fuzzy Hash: 32F0F670284B42B9E610AA758C13F3B21C89B40B49F80083EBD09EA1C3D7BDC80C4A2F
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D4F5
                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D505
                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D515
                                                                  • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F47B,00000000,0047F4A4), ref: 0045D53A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CryptVersion
                                                                  • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                  • API String ID: 1951258720-508647305
                                                                  • Opcode ID: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                  • Instruction ID: 2c2546d05897d0e560449e180de6b9da44e6f0241588afb6de3da162f6531889
                                                                  • Opcode Fuzzy Hash: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                                  • Instruction Fuzzy Hash: 3AF012F0940704EBEB18DFB6BCC67623695ABD531AF14C137A404A51A2E778044CCE1D
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90,?,?,00000000,0049B628), ref: 00497ACB
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00497B4E
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000), ref: 00497B66
                                                                  • FindClose.KERNEL32(000000FF,00497B91,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90), ref: 00497B84
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$AttributesCloseFirstNext
                                                                  • String ID: isRS-$isRS-???.tmp
                                                                  • API String ID: 134685335-3422211394
                                                                  • Opcode ID: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                  • Instruction ID: b2847bb1a44685988a55541ee7ac685ebeb66ffb5e30493f66813578f7a68db2
                                                                  • Opcode Fuzzy Hash: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                                  • Instruction Fuzzy Hash: A63165719146186FCF10EF65CC41ADEBBBCDB45318F5084F7A808A32A1E638AE458F58
                                                                  APIs
                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457449
                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457470
                                                                  • SetForegroundWindow.USER32(?), ref: 00457481
                                                                  • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045775B,?,00000000,00457797), ref: 00457746
                                                                  Strings
                                                                  • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575C6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                  • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                  • API String ID: 2236967946-3182603685
                                                                  • Opcode ID: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                  • Instruction ID: 5bc10c0d354cae83c82450a0913647aad13fd3ad71d4eb48676ad76960377df7
                                                                  • Opcode Fuzzy Hash: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                                  • Instruction Fuzzy Hash: D9910034608204EFD715CF54E991F5ABBF9EB89305F2180BAED0897792D638AE04DF58
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F37), ref: 00455E28
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E2E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                  • API String ID: 1646373207-3712701948
                                                                  • Opcode ID: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                  • Instruction ID: 12dfdd1b414f9b5fa57bb507e68127e36b1c1a940f154b23c6ee37fdedd7ee09
                                                                  • Opcode Fuzzy Hash: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                                  • Instruction Fuzzy Hash: 66415171A04649AFCF01EFA5C8929EFB7B8EF49304F508566F800F7252D6785E09CB69
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00417D1F
                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Placement$Iconic
                                                                  • String ID: ,
                                                                  • API String ID: 568898626-3772416878
                                                                  • Opcode ID: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                  • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                                  • Opcode Fuzzy Hash: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                                  • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001,00000000,00464205), ref: 00464079
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 00464108
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 0046419A
                                                                  • FindClose.KERNEL32(000000FF,004641C1,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 004641B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                  • String ID:
                                                                  • API String ID: 4011626565-0
                                                                  • Opcode ID: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                  • Instruction ID: 2652c2d8e8669354d55d474f1d59e7b06630ff05c6329d0403030a32038cf055
                                                                  • Opcode Fuzzy Hash: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                                  • Instruction Fuzzy Hash: 1E418770A00618AFCF10EF65DC55ADEB7B8EB89705F5044BAF804E7381E67C9E848E59
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001,00000000,004646AB), ref: 00464539
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 0046457F
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464634
                                                                  • FindClose.KERNEL32(000000FF,0046465F,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464652
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                  • String ID:
                                                                  • API String ID: 4011626565-0
                                                                  • Opcode ID: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                  • Instruction ID: 7635123f594c8b6db569002a9bb01bf8fa96c74c2cf80da52efac59b167f1e7c
                                                                  • Opcode Fuzzy Hash: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                                  • Instruction Fuzzy Hash: D8416171A00A18EBCB10EFA5CC959DEB7B9EB88305F4044AAF804A7351E77C9E448E59
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E966
                                                                  • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                  • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E99E
                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9A6
                                                                  • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                  • String ID:
                                                                  • API String ID: 1177325624-0
                                                                  • Opcode ID: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                  • Instruction ID: 40e29ed62a0e901db822078ff48c294e58af048427126d47a83bbc7ee0829aa9
                                                                  • Opcode Fuzzy Hash: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                                  • Instruction Fuzzy Hash: 4BF090B23A17207AF620B57A6C86F7F418CC785B68F10823BBB04FF1C1D9A85D05556D
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 004833FA
                                                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 00483418
                                                                  • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048343A
                                                                  • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048344E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$IconicLong
                                                                  • String ID:
                                                                  • API String ID: 2754861897-0
                                                                  • Opcode ID: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                  • Instruction ID: 9902e76ed030cf172564c6423cfc444f456bf65fce7539c2ce1f68efba32f602
                                                                  • Opcode Fuzzy Hash: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                                  • Instruction Fuzzy Hash: 4D017134A452019EEB11BBA5DD8AB5B27C45F10B09F08083BB9029F2A3CB6D9D41D71C
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00462B90), ref: 00462B14
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B50
                                                                  • FindClose.KERNEL32(000000FF,00462B77,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstNext
                                                                  • String ID:
                                                                  • API String ID: 3541575487-0
                                                                  • Opcode ID: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                  • Instruction ID: 0f193a6fcf1d943c675bf75123405c31ceeb2ecab595186adb6c93933d2a98b0
                                                                  • Opcode Fuzzy Hash: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                                  • Instruction Fuzzy Hash: 7121D871904B087EDB11DF65CC51ADEBBACDB49704F5084F7E808E31A1E6BCAE44CA5A
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 004241F4
                                                                  • SetActiveWindow.USER32(?,?,?,0046CFFB), ref: 00424201
                                                                    • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                    • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021225AC,0042421A,?,?,?,0046CFFB), ref: 00423B5F
                                                                  • SetFocus.USER32(00000000,?,?,?,0046CFFB), ref: 0042422E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveFocusIconicShow
                                                                  • String ID:
                                                                  • API String ID: 649377781-0
                                                                  • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                  • Instruction ID: 85e094fd83fda52d6ba69bb43f194f943737e29f022f28d5c3d7585fd8a6de7d
                                                                  • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                                  • Instruction Fuzzy Hash: ECF03A717001208BDB10EFAAA8C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00417D1F
                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Placement$Iconic
                                                                  • String ID:
                                                                  • API String ID: 568898626-0
                                                                  • Opcode ID: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                  • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                                  • Opcode Fuzzy Hash: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                                  • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CaptureIconic
                                                                  • String ID:
                                                                  • API String ID: 2277910766-0
                                                                  • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                  • Instruction ID: edcb67aebd7cb7e0e4c3241a821d6ac110e093164443c601d5aebb18a23c44a8
                                                                  • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                                  • Instruction Fuzzy Hash: A2F04F32304A028BDB21A72EC885AEB62F5DF84368B14443FE415CB765EB7CDCD58758
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 004241AB
                                                                    • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                    • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                    • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                    • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                  • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                    • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                  • String ID:
                                                                  • API String ID: 2671590913-0
                                                                  • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                  • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                                  • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                                  • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                  • Instruction ID: 2af12fea25256c3ae9471bae8fd4feed52cec15eb5e351c91de8273fd3ce68b3
                                                                  • Opcode Fuzzy Hash: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                                  • Instruction Fuzzy Hash: 055106316082058FD710DB6AD681A9BF3E5FF98304B2482BBD814C7392D7B8EDA1C759
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478B2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                  • Instruction ID: 518aae51b6d6b411e39a58dd47dc5b2362a2c83c3bfed1ee6c3543fdde473bb3
                                                                  • Opcode Fuzzy Hash: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                                  • Instruction Fuzzy Hash: 04413775644104DFCB10CF99C6898AAB7F5FB48310B74CA9AE848DB705DB38EE41DB54
                                                                  APIs
                                                                  • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D5AB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CryptFour
                                                                  • String ID:
                                                                  • API String ID: 2153018856-0
                                                                  • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                  • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                                  • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                                  • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                                  APIs
                                                                  • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DDBC,?,0046DF9D), ref: 0045D5BE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CryptFour
                                                                  • String ID:
                                                                  • API String ID: 2153018856-0
                                                                  • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                  • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                                  • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                                  • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3386673933.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000001.00000002.3386653827.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3386694535.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_10000000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                  • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                  • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                  • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3386673933.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000001.00000002.3386653827.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3386694535.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_10000000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                  • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                  • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                    • Part of subcall function 0044B614: GetVersionExA.KERNEL32(00000094), ref: 0044B631
                                                                  • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                  • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                  • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                  • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7D9
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7EB
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7FD
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B80F
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B821
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B833
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B845
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B857
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B869
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B87B
                                                                  • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B88D
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B89F
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8B1
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8C3
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8D5
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8E7
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8F9
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B90B
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B91D
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B92F
                                                                  • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B941
                                                                  • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B953
                                                                  • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B965
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B977
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B989
                                                                  • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B99B
                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B9AD
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9BF
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9D1
                                                                  • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoadVersion
                                                                  • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                  • API String ID: 1968650500-2910565190
                                                                  • Opcode ID: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                  • Instruction ID: 346aa6b979044c2d6f95573bc57da9b6801dc261a15d858c7a91061cf3dc2738
                                                                  • Opcode Fuzzy Hash: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                                  • Instruction Fuzzy Hash: CC91E7B0A40B50EBEF00EBF5ADC6A2637A8EB15B14714467BB444EF295D778D800CF99
                                                                  APIs
                                                                  • CreateMutexA.KERNEL32(00499B18,00000001,00000000,00000000,004584B9,?,?,?,00000001,?,004586D3,00000000,004586E9,?,00000000,0049B628), ref: 004581D1
                                                                  • CreateFileMappingA.KERNEL32(000000FF,00499B18,00000004,00000000,00002018,00000000), ref: 00458209
                                                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9,?,?,?), ref: 00458230
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045833D
                                                                  • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9), ref: 00458295
                                                                    • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                  • CloseHandle.KERNEL32(004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458354
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045838D
                                                                  • GetLastError.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045839F
                                                                  • UnmapViewOfFile.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458471
                                                                  • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458480
                                                                  • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458489
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                  • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                  • API String ID: 4012871263-351310198
                                                                  • Opcode ID: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                  • Instruction ID: 29107a7cf73729034b65a1fcaaf08eab05738b19563c620e852bf3134b102344
                                                                  • Opcode Fuzzy Hash: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                                  • Instruction Fuzzy Hash: 46914170A002099BDB10EFA9C845B9EB7B4EB05305F50856FED14FB283DF7899498F69
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                                  • 73EA4C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                                  • 73EA6180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                                  • 73EA4C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                                  • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                  • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                  • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                  • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                  • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                  • 73EA4C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                  • 73E98830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                                  • 73E922A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                                  • 73E98830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                                  • 73E922A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                  • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                  • 73EA4D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                                  • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                  • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                    • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Color$ObjectSelect$E922E98830Text$A570A6180DeleteFillRect
                                                                  • String ID:
                                                                  • API String ID: 1952589944-0
                                                                  • Opcode ID: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                  • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                                  • Opcode Fuzzy Hash: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                                  • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                                  APIs
                                                                  • ShowWindow.USER32(?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000,004984F9,?,00000000), ref: 00497E23
                                                                  • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000), ref: 00497E36
                                                                  • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000), ref: 00497E46
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00497E67
                                                                  • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000), ref: 00497E77
                                                                    • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                  • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                  • API String ID: 2000705611-3672972446
                                                                  • Opcode ID: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                  • Instruction ID: d71e95358f961f9c8085103628ed7ebfe7aaf39cab9d6a0a027eda6f41515cae
                                                                  • Opcode Fuzzy Hash: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                                  • Instruction Fuzzy Hash: C291B530A042449FDF11EBA9DC52BAE7FA4EF4A304F51447BF500AB292DA7DAC05CB59
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,0045ACF8,?,?,?,?,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045ABAA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                  • API String ID: 1452528299-3112430753
                                                                  • Opcode ID: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                  • Instruction ID: f5e388fb48f96f1c0466849e1c52bdf0d536658550fb6e74c3a20cf80cd44526
                                                                  • Opcode Fuzzy Hash: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                                  • Instruction Fuzzy Hash: 2271AE707002445BDB01EB69D8427AE77A6AF48316F50856BFC01DB383CA7C9A5DC79A
                                                                  APIs
                                                                  • GetVersion.KERNEL32 ref: 0045CF3E
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CF5E
                                                                  • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CF6B
                                                                  • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CF78
                                                                  • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CF86
                                                                    • Part of subcall function 0045CE2C: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CECB,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CEA5
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D03F
                                                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D048
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                  • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                  • API String ID: 59345061-4263478283
                                                                  • Opcode ID: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                  • Instruction ID: 4ce31bb81caf279f5ed3d10c62bb09a2aad5f6c7ba3f26a8019cd68bbbdcec0a
                                                                  • Opcode Fuzzy Hash: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                                  • Instruction Fuzzy Hash: E95193B1D00608EFDB10DFA9C845BAEBBB8EF48315F14806AF915B7381C2389945CF69
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,0045688D), ref: 00456592
                                                                  • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,0045688D), ref: 004565B8
                                                                  • SysFreeString.OLEAUT32(?), ref: 00456745
                                                                  Strings
                                                                  • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004567B6
                                                                  • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004566A7
                                                                  • IPersistFile::Save, xrefs: 00456814
                                                                  • CoCreateInstance, xrefs: 004565C3
                                                                  • IPropertyStore::Commit, xrefs: 00456795
                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045677C
                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566DB
                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 0045672A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance$FreeString
                                                                  • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                                  • API String ID: 308859552-3936712486
                                                                  • Opcode ID: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                  • Instruction ID: c99fdec92309fd26656a6f7ea9bd91ecf5cc306c054acb75a5569a06f28a4b2e
                                                                  • Opcode Fuzzy Hash: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                                  • Instruction Fuzzy Hash: 29A13E71A00104AFDB50EFA9C885B9E7BF8EF09706F55406AF804E7252DB38DD48CB69
                                                                  APIs
                                                                  • 73EA4C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                                  • 73EA4C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                                  • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                  • 73EA6180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                                  • 73E9A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                                  • 73EA4C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                                  • 73E9A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                  • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                  • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$Delete$A480A570A6180Stretch
                                                                  • String ID:
                                                                  • API String ID: 1888863034-0
                                                                  • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                  • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                                  • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                                  • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                                  APIs
                                                                    • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472F70
                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473077
                                                                  • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047308D
                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004730B2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                  • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                  • API String ID: 971782779-3668018701
                                                                  • Opcode ID: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                  • Instruction ID: 1ded2309c22d90a9957aabde76cedeacc99048359e90752decbb9b8a0015ab1b
                                                                  • Opcode Fuzzy Hash: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                                  • Instruction Fuzzy Hash: 8FD12574A00149AFDB01EFA9D581BDDBBF5AF08305F50806AF804B7392D778AE45CB69
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,?,00000000,?,00000000,00454AF9,?,0045AECE,00000003,00000000,00000000,00454B30), ref: 00454979
                                                                    • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                  • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 004549FD
                                                                  • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 00454A2C
                                                                  Strings
                                                                  • , xrefs: 004548EA
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548D0
                                                                  • RegOpenKeyEx, xrefs: 004548FC
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454897
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue$FormatMessageOpen
                                                                  • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                  • API String ID: 2812809588-1577016196
                                                                  • Opcode ID: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                  • Instruction ID: 44bd6ba1492406805f437c97fe518088f2f8e7c1bef0b67c8a01139b77ca8c69
                                                                  • Opcode Fuzzy Hash: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                                  • Instruction Fuzzy Hash: C0911471944248ABDB10DFE5D942BDEB7FCEB48309F50406BF900FB282D6789E458B69
                                                                  APIs
                                                                    • Part of subcall function 004596C8: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459863
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 004598CD
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459934
                                                                  Strings
                                                                  • .NET Framework not found, xrefs: 00459981
                                                                  • v4.0.30319, xrefs: 00459855
                                                                  • v1.1.4322, xrefs: 00459926
                                                                  • v2.0.50727, xrefs: 004598BF
                                                                  • .NET Framework version %s not found, xrefs: 0045996D
                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459816
                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004598E7
                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459880
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Close$Open
                                                                  • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                  • API String ID: 2976201327-446240816
                                                                  • Opcode ID: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                  • Instruction ID: 729b419896cd5506e065475e0ee5015c208a67e93f4f54458093df2d8724af3d
                                                                  • Opcode Fuzzy Hash: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                                  • Instruction Fuzzy Hash: 0051A030A04145EBCB04DFA9C8A1BEE77B69B59305F54447FA841DB393D63D9E0E8B18
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(?), ref: 00458DDF
                                                                  • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458DFB
                                                                  • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458E09
                                                                  • GetExitCodeProcess.KERNEL32(?), ref: 00458E1A
                                                                  • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E61
                                                                  • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E7D
                                                                  Strings
                                                                  • Stopping 64-bit helper process. (PID: %u), xrefs: 00458DD1
                                                                  • Helper process exited., xrefs: 00458E29
                                                                  • Helper process exited, but failed to get exit code., xrefs: 00458E53
                                                                  • Helper process exited with failure code: 0x%x, xrefs: 00458E47
                                                                  • Helper isn't responding; killing it., xrefs: 00458DEB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                  • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                  • API String ID: 3355656108-1243109208
                                                                  • Opcode ID: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                  • Instruction ID: b06cb4cb11178ece3cea1db1bc2ca69ea432733d5239d7d0987fb8f0d427a68f
                                                                  • Opcode Fuzzy Hash: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                                  • Instruction Fuzzy Hash: D9216D706047009AD720E679C44275BB6E59F08709F04CC2FB999EB293DF78E8488B2A
                                                                  APIs
                                                                    • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 0045463B
                                                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 00454777
                                                                    • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                  Strings
                                                                  • , xrefs: 0045459D
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454553
                                                                  • RegCreateKeyEx, xrefs: 004545AF
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454583
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateFormatMessageQueryValue
                                                                  • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                  • API String ID: 2481121983-1280779767
                                                                  • Opcode ID: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                  • Instruction ID: a200d9e45076b9aa1c9026ee470310bfc0f5ccdb1a8093a9a555fb12639cba12
                                                                  • Opcode Fuzzy Hash: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                                  • Instruction Fuzzy Hash: 6C81DE75A00209AFDB00DFD5C941BDFB7F9EB49309F50442AE901FB282D7789A45CB69
                                                                  APIs
                                                                    • Part of subcall function 004538A8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                    • Part of subcall function 004538A8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                  • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0049669D
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004967F1), ref: 004966BE
                                                                  • CreateWindowExA.USER32(00000000,STATIC,00496800,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004966E5
                                                                  • SetWindowLongA.USER32(?,000000FC,00495E78), ref: 004966F8
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC,00496800), ref: 00496728
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0049679C
                                                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000), ref: 004967A8
                                                                    • Part of subcall function 00453D1C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                  • 73EA5CF0.USER32(?,004967CB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC), ref: 004967BE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                  • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                  • API String ID: 170458502-2312673372
                                                                  • Opcode ID: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                  • Instruction ID: 3fac7199250898b77632ea887e905273a0ca2a52c1bf25bf17bddf130f7f486a
                                                                  • Opcode Fuzzy Hash: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                                  • Instruction Fuzzy Hash: EE413D70A44208AFDF01EFA5DC42F9E7BB8EB09714F61457AF500F7291D6799E008BA8
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E451
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E4A5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCloseHandleModuleProc
                                                                  • String ID: .DEFAULT\Control Panel\International$=aE$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                  • API String ID: 4190037839-1003587384
                                                                  • Opcode ID: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                  • Instruction ID: 6214d84d9e891aa165dd1588e79579c1e4a82babed7fc21810c195be89e1891e
                                                                  • Opcode Fuzzy Hash: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                                  • Instruction Fuzzy Hash: 65215230B10219ABCB10EAE7DC45A9E77A8EB04318FA04877A500E7281EB7CDE41CA5C
                                                                  APIs
                                                                  • GetActiveWindow.USER32 ref: 00462D68
                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462D7C
                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462D89
                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462D96
                                                                  • GetWindowRect.USER32(?,00000000), ref: 00462DE2
                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462E20
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                  • API String ID: 2610873146-3407710046
                                                                  • Opcode ID: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                  • Instruction ID: 308e9426e96dcd15a0811dc773674cbbce9379ede84ac64ebea6e7762974983c
                                                                  • Opcode Fuzzy Hash: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                                  • Instruction Fuzzy Hash: 8421A775701B046FD3019A64DD41F3B3395DB94714F08453AF944EB381E6B9EC018A9A
                                                                  APIs
                                                                  • GetActiveWindow.USER32 ref: 0042F1A4
                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1B8
                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1C5
                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1D2
                                                                  • GetWindowRect.USER32(?,00000000), ref: 0042F21E
                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F25C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                  • API String ID: 2610873146-3407710046
                                                                  • Opcode ID: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                  • Instruction ID: f96f766bc13e38d455a6b30724ea53c80225cfaaeacd9570d6dca051b777ffc7
                                                                  • Opcode Fuzzy Hash: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                                  • Instruction Fuzzy Hash: 3221D7797057149BD300D664ED81F3B33A4DB85B14F88457AF944DB381D679EC044BA9
                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045915F,?,00000000,004591C2,?,?,02123858,00000000), ref: 00458FDD
                                                                  • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 0045903A
                                                                  • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 00459047
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00459093
                                                                  • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004590F4,?,00000000), ref: 004590B9
                                                                  • GetLastError.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004590F4,?,00000000), ref: 004590C0
                                                                    • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                  • String ID: CreateEvent$TransactNamedPipe
                                                                  • API String ID: 2182916169-3012584893
                                                                  • Opcode ID: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                  • Instruction ID: 50fb7c1009465aa7c5405e125e9101384e11cc4d6b330c20a7fc1de2f8ccdd80
                                                                  • Opcode Fuzzy Hash: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                                  • Instruction Fuzzy Hash: 68417F71A00608EFDB15DF99C985F9EB7F9EB08714F1044AAF904E72D2C6789E44CB28
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CBD,?,?,00000031,?), ref: 00456B80
                                                                  • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B86
                                                                  • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BD3
                                                                    • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                  • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                  • API String ID: 1914119943-2711329623
                                                                  • Opcode ID: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                  • Instruction ID: a27b950e9f8baa5d3fd7d83d3f5f0f06fd95d714c0010da27a3b0cf72a10e13f
                                                                  • Opcode Fuzzy Hash: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                                  • Instruction Fuzzy Hash: AB319471B00604AFDB12EFAACC41D5BB7BDEB897557528466FC04D7252DA38DD04CB28
                                                                  APIs
                                                                  • RectVisible.GDI32(?,?), ref: 00416E23
                                                                  • SaveDC.GDI32(?), ref: 00416E37
                                                                  • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                  • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                  • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                  • DeleteObject.GDI32(?), ref: 00416F32
                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                  • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                  • DeleteObject.GDI32(?), ref: 00416F7F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                  • String ID:
                                                                  • API String ID: 375863564-0
                                                                  • Opcode ID: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                  • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                                  • Opcode Fuzzy Hash: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                                  • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                  • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                  • String ID:
                                                                  • API String ID: 1694776339-0
                                                                  • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                  • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                  • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                  • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                  APIs
                                                                  • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                  • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                  • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                  • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                  • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                  • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                  • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                  • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Delete$EnableItem$System
                                                                  • String ID:
                                                                  • API String ID: 3985193851-0
                                                                  • Opcode ID: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                  • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                                  • Opcode Fuzzy Hash: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                                  • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(10000000), ref: 00481499
                                                                  • FreeLibrary.KERNEL32(03100000), ref: 004814AD
                                                                  • SendNotifyMessageA.USER32(000203DC,00000496,00002710,00000000), ref: 0048151F
                                                                  Strings
                                                                  • Not restarting Windows because Setup is being run from the debugger., xrefs: 004814CE
                                                                  • Deinitializing Setup., xrefs: 004812FA
                                                                  • GetCustomSetupExitCode, xrefs: 00481339
                                                                  • Restarting Windows., xrefs: 004814FA
                                                                  • DeinitializeSetup, xrefs: 00481395
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary$MessageNotifySend
                                                                  • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                  • API String ID: 3817813901-1884538726
                                                                  • Opcode ID: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                  • Instruction ID: fb8259b883485ef9100c7f5c1e95e74d54582b152ce66d5af1bc00326fba4159
                                                                  • Opcode Fuzzy Hash: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                                  • Instruction Fuzzy Hash: 4451A034704240AFD711EB69D895B2E7BE9FB59704F50887BE801C72B1DB38A846CB5D
                                                                  APIs
                                                                  • SHGetMalloc.SHELL32(?), ref: 00461A33
                                                                  • GetActiveWindow.USER32 ref: 00461A97
                                                                  • CoInitialize.OLE32(00000000), ref: 00461AAB
                                                                  • SHBrowseForFolder.SHELL32(?), ref: 00461AC2
                                                                  • CoUninitialize.OLE32(00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AD7
                                                                  • SetActiveWindow.USER32(?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AED
                                                                  • SetActiveWindow.USER32(?,?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AF6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                  • String ID: A
                                                                  • API String ID: 2684663990-3554254475
                                                                  • Opcode ID: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                  • Instruction ID: 1302daae15839a874164301860301a8b98b45f7dd6f96d3c0913b4bd506695dd
                                                                  • Opcode Fuzzy Hash: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                                  • Instruction Fuzzy Hash: 64314FB0E00248AFDB00EFE6D885A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85,?,?,00000000,004731F4), ref: 00472C8C
                                                                    • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                    • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85), ref: 00472D03
                                                                  • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000), ref: 00472D09
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                  • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                  • API String ID: 884541143-1710247218
                                                                  • Opcode ID: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                  • Instruction ID: a2498b92200520dbea2b626460b71344a260e4c3afc9e0684e621ff8b49742b9
                                                                  • Opcode Fuzzy Hash: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                                  • Instruction Fuzzy Hash: 731122303005087BD721EA66DD82B9E73ACCB88714F60853BB404B72D1CB7CEE02865C
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(03100000,inflateInit_), ref: 0045D621
                                                                  • GetProcAddress.KERNEL32(03100000,inflate), ref: 0045D631
                                                                  • GetProcAddress.KERNEL32(03100000,inflateEnd), ref: 0045D641
                                                                  • GetProcAddress.KERNEL32(03100000,inflateReset), ref: 0045D651
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                  • API String ID: 190572456-3516654456
                                                                  • Opcode ID: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                  • Instruction ID: 6d5035e3426567f523c7c0f539c0fc89aa7e9857b83a97dd2a4ec5b9764e3533
                                                                  • Opcode Fuzzy Hash: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                                  • Instruction Fuzzy Hash: 0D01ECB0900740DEEB24DFB6ACC572236A5ABA470AF14C13B980DD62A2D779044ADF2C
                                                                  APIs
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                  • 73EA4D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                                  • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                  • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                  • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Color$StretchText
                                                                  • String ID:
                                                                  • API String ID: 2984075790-0
                                                                  • Opcode ID: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                  • Instruction ID: 0e7efefeb240adcf91359f1fba61dc18d1efd34d50a4dd97ee32c9a960060edb
                                                                  • Opcode Fuzzy Hash: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                                  • Instruction Fuzzy Hash: 9861C5B5A00105EFCB40EFADD985E9AB7F8AF08314B10856AF918DB261C735ED41CF68
                                                                  APIs
                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004580B4,?, /s ",?,regsvr32.exe",?,004580B4), ref: 00458026
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDirectoryHandleSystem
                                                                  • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                  • API String ID: 2051275411-1862435767
                                                                  • Opcode ID: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                  • Instruction ID: 809e342f07c36c5fe80e3456e65159aecd70c9e1b429d99a18f855550af0e9f5
                                                                  • Opcode Fuzzy Hash: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                                  • Instruction Fuzzy Hash: 97411570A043086BDB10EFD5D842B8EF7B9AB49705F51407FA904BB292DF789A0D8B19
                                                                  APIs
                                                                  • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1B9
                                                                  • GetSysColor.USER32(00000014), ref: 0044D1C0
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044D1D8
                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D201
                                                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D20B
                                                                  • GetSysColor.USER32(00000010), ref: 0044D212
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044D22A
                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D253
                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D27E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Text$Color$Draw$OffsetRect
                                                                  • String ID:
                                                                  • API String ID: 1005981011-0
                                                                  • Opcode ID: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                  • Instruction ID: 3cb6cff9cb4fe1f97db5fca9cf7ecf77bacdc285bba155e9e6a5fbb2dce94e66
                                                                  • Opcode Fuzzy Hash: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                                  • Instruction Fuzzy Hash: 4921CFB42015007FC710FB6ACD8AE8B7BDCDF19319B01857AB918EB393C678DD408669
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 0041B755
                                                                  • 73E9A570.USER32(?), ref: 0041B761
                                                                  • 73E98830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                                  • 73E922A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                                  • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                                  • 73E98830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: E98830$A570A6310E922Focus
                                                                  • String ID: k H
                                                                  • API String ID: 184897721-1447039187
                                                                  • Opcode ID: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                  • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                                  • Opcode Fuzzy Hash: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                                  • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 0041BA27
                                                                  • 73E9A570.USER32(?), ref: 0041BA33
                                                                  • 73E98830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                                  • 73E922A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                                  • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                                  • 73E98830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: E98830$A570A6310E922Focus
                                                                  • String ID: k H
                                                                  • API String ID: 184897721-1447039187
                                                                  • Opcode ID: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                  • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                                  • Opcode Fuzzy Hash: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                                  • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                                  APIs
                                                                    • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                    • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495F55
                                                                  • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495F69
                                                                  • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495F83
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F8F
                                                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F95
                                                                  • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495FA8
                                                                  Strings
                                                                  • Deleting Uninstall data files., xrefs: 00495ECB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                  • String ID: Deleting Uninstall data files.
                                                                  • API String ID: 1570157960-2568741658
                                                                  • Opcode ID: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                  • Instruction ID: fec72cc46ef3efd5c3c8e8a450f489c3c08d507a48e2b84f6ee45df75d5b7e94
                                                                  • Opcode Fuzzy Hash: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                                  • Instruction Fuzzy Hash: 34219571304610AFEB11EB75ECC2B2637A8EB54338F61053BF504DA1E6D678AC008B1D
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1,?,?,?,?,00000000), ref: 0047050B
                                                                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1), ref: 00470522
                                                                  • AddFontResourceA.GDI32(00000000), ref: 0047053F
                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00470553
                                                                  Strings
                                                                  • Failed to open Fonts registry key., xrefs: 00470529
                                                                  • Failed to set value in Fonts registry key., xrefs: 00470514
                                                                  • AddFontResource, xrefs: 0047055D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                  • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                  • API String ID: 955540645-649663873
                                                                  • Opcode ID: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                  • Instruction ID: 66ce3b01f7eb708e2302e7809b1ea03697ff66c32de1c99646f3643d23023453
                                                                  • Opcode Fuzzy Hash: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                                  • Instruction Fuzzy Hash: 62216570741204BBDB10EA669C42FAE779D9B55708F50843BB904EB3C2D67CDE028A5D
                                                                  APIs
                                                                    • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                    • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                    • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                  • GetVersion.KERNEL32 ref: 004631CC
                                                                  • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0046320A
                                                                  • SHGetFileInfo.SHELL32(004632A8,00000000,?,00000160,00004011), ref: 00463227
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00463245
                                                                  • SetCursor.USER32(00000000,00000000,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046324B
                                                                  • SetCursor.USER32(?,0046328B,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046327E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                  • String ID: Explorer
                                                                  • API String ID: 2594429197-512347832
                                                                  • Opcode ID: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                  • Instruction ID: b0d998c5e58c3251a46d3edbb0a2afbc6be3b3781793d4cbec8386629f90fe5f
                                                                  • Opcode Fuzzy Hash: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                                  • Instruction Fuzzy Hash: FA21E7307403446AEB10FF795C57F9A7698DB09709F5040BFF605EA1C3EA7C8908866D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02122BE0,?,?,?,02122BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BE0,?,?,?,02122BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                  • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BE0,?,?,?,02122BE0), ref: 004782E8
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,02122BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                  • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                  • API String ID: 2704155762-2318956294
                                                                  • Opcode ID: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                  • Instruction ID: d6ca79aa4c48c3adffb9da4b01ee7f27494699adf3768a2d59cb90ace03db172
                                                                  • Opcode Fuzzy Hash: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                                  • Instruction Fuzzy Hash: 5701C4707C0B0466E520316E4D8AFEB554C8B54B69F54813F7E0CEA2C2DDAE8D06016E
                                                                  APIs
                                                                  • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                  • LocalFree.KERNEL32(005D46C8,00000000,00401B68), ref: 00401ACF
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,005D46C8,00000000,00401B68), ref: 00401AEE
                                                                  • LocalFree.KERNEL32(005D56C8,?,00000000,00008000,005D46C8,00000000,00401B68), ref: 00401B2D
                                                                  • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                  • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                  • String ID: \]
                                                                  • API String ID: 3782394904-3890588557
                                                                  • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                  • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                  • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                  • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,0045A2F2,?,00000000,00000000,00000000,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045A236
                                                                    • Part of subcall function 004543E0: FindClose.KERNEL32(000000FF,004544D6), ref: 004544C5
                                                                  Strings
                                                                  • Stripped read-only attribute., xrefs: 0045A1F8
                                                                  • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A2AB
                                                                  • Failed to strip read-only attribute., xrefs: 0045A204
                                                                  • Failed to delete directory (%d)., xrefs: 0045A2CC
                                                                  • Failed to delete directory (%d). Will retry later., xrefs: 0045A24F
                                                                  • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A210
                                                                  • Deleting directory: %s, xrefs: 0045A1BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseErrorFindLast
                                                                  • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                  • API String ID: 754982922-1448842058
                                                                  • Opcode ID: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                  • Instruction ID: e72d66395cbcced70a1ff0d39e5b36b51bb4b2a363b16cebf3a96f2a9050ba33
                                                                  • Opcode Fuzzy Hash: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                                  • Instruction Fuzzy Hash: 9A41A730A042449ACB00DBA988463AE76A55F4930AF5486BBBC04D7393CB7D8E1D875F
                                                                  APIs
                                                                  • GetCapture.USER32 ref: 00422EB4
                                                                  • GetCapture.USER32 ref: 00422EC3
                                                                  • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                  • ReleaseCapture.USER32 ref: 00422ECE
                                                                  • GetActiveWindow.USER32 ref: 00422EDD
                                                                  • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                  • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                  • GetActiveWindow.USER32 ref: 00422FCF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                  • String ID:
                                                                  • API String ID: 862346643-0
                                                                  • Opcode ID: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                  • Instruction ID: 0c1e69f79f034fd7694da938dfb4ae80f60ee9794ae3f0b0e2c785ff7ec3c7d8
                                                                  • Opcode Fuzzy Hash: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                                  • Instruction Fuzzy Hash: E4413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF500AB392DB78AE40DB5D
                                                                  APIs
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 0042F2CA
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0042F2E1
                                                                  • GetActiveWindow.USER32 ref: 0042F2EA
                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F317
                                                                  • SetActiveWindow.USER32(?,0042F447,00000000,?), ref: 0042F338
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveLong$Message
                                                                  • String ID:
                                                                  • API String ID: 2785966331-0
                                                                  • Opcode ID: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                  • Instruction ID: 0493a3c03df3966e51b4b777c60d25e7c68e0b9e8cdf2dbcd65ae894a3a71964
                                                                  • Opcode Fuzzy Hash: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                                  • Instruction Fuzzy Hash: 7631B471A00654AFDB01EFB5DC52E6EBBB8EB09714B91447AF804E3691D738AD10CB58
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000), ref: 0042949A
                                                                  • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                    • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                  • 73E9A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                                  • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                  • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                  • String ID:
                                                                  • API String ID: 361401722-0
                                                                  • Opcode ID: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                  • Instruction ID: f9189b99ec718bdc55f682ba078bc6b9c4dab98ca430e676b6dc028aca6f8884
                                                                  • Opcode Fuzzy Hash: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                                  • Instruction Fuzzy Hash: 3301E1917087513BFB11B67A9CC2F6B61C8CB8435CF44043FFA459A3D2D96C9C80866A
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000,?,00419069,004985AE), ref: 0041DE37
                                                                  • 73EA4620.GDI32(00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE41
                                                                  • 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE4E
                                                                  • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                  • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                  • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                  • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                  • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectStock$A4620A480A570IconLoad
                                                                  • String ID:
                                                                  • API String ID: 2905290459-0
                                                                  • Opcode ID: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                  • Instruction ID: 4e0a0a69a1fbcc37fa68332f5170e2556ef2fd96a8c36c1a21edcb526b0e3b4b
                                                                  • Opcode Fuzzy Hash: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                                  • Instruction Fuzzy Hash: E11100B06457015AE740FF666A92BA63694D724708F00813FF605AF3D2D7792C449B9E
                                                                  APIs
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004636B0
                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463745), ref: 004636B6
                                                                  • SetCursor.USER32(?,0046372D,00007F02,00000000,00463745), ref: 00463720
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$Load
                                                                  • String ID: $ $Internal error: Item already expanding
                                                                  • API String ID: 1675784387-1948079669
                                                                  • Opcode ID: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                  • Instruction ID: 5f7148262a90782ca5f39c73a98182432cf514ee5891adbc4e31059349ad3c9c
                                                                  • Opcode Fuzzy Hash: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                                  • Instruction Fuzzy Hash: EEB19270600284DFD710DF29C585B9ABBF1AF04319F14C4AAE8459B792E778EE48CF5A
                                                                  APIs
                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfileStringWrite
                                                                  • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                  • API String ID: 390214022-3304407042
                                                                  • Opcode ID: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                  • Instruction ID: f7f3e57e327ad0b7fc32dd9a0c0ef844c3cf52932767352b59a94e8a2e0b7a1e
                                                                  • Opcode Fuzzy Hash: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                                  • Instruction Fuzzy Hash: 0E910534E001099BDB01EFA5D842BDEB7F5EF4874AF50806AE90077292D7786E49CB59
                                                                  APIs
                                                                  • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476BC5
                                                                  • 73EA59E0.USER32(00000000,000000FC,00476B20,00000000,00476E04,?,00000000,00476E2E), ref: 00476BEC
                                                                  • GetACP.KERNEL32(00000000,00476E04,?,00000000,00476E2E), ref: 00476C29
                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476C6F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ClassInfoMessageSend
                                                                  • String ID: COMBOBOX$Inno Setup: Language
                                                                  • API String ID: 1455646776-4234151509
                                                                  • Opcode ID: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                  • Instruction ID: 76a62d5c2b18ddabed1a1f2db415f61daf58d6c828ad3828204ddc2489713d7e
                                                                  • Opcode Fuzzy Hash: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                                  • Instruction Fuzzy Hash: 4E813C346006059FC720DF69C985AEAB7F2FB09304F1580BAE849E7762D738ED41CB59
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                                    • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                    • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale$DefaultSystem
                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                  • API String ID: 1044490935-665933166
                                                                  • Opcode ID: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                  • Instruction ID: bf07bec6589cb82417a29d9109d5e68838e6a5c97ac1b9e4b464d3d1e075229e
                                                                  • Opcode Fuzzy Hash: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                                  • Instruction Fuzzy Hash: 55513E24B00108ABD701FBA69E41A9E77A9DB94304F50C07FA541BB3C7DA3DDE05975D
                                                                  APIs
                                                                  • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                  • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                    • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                  • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                    • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                  • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                  • String ID: ,$?
                                                                  • API String ID: 2359071979-2308483597
                                                                  • Opcode ID: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                  • Instruction ID: df95c3f439c97799bb0998fa3429798e8a176efd4e8e18b788060c5868d8049e
                                                                  • Opcode Fuzzy Hash: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                                  • Instruction Fuzzy Hash: BA51F674A00144ABDB10EF6ADC816DA7BF9AF09304B11857BF914E73A6E738DD41CB58
                                                                  APIs
                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                  • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                  • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                  • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                  • String ID:
                                                                  • API String ID: 1030595962-0
                                                                  • Opcode ID: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                  • Instruction ID: 0934d86ca8fb123134a847d885dc0ae0ba41a9d0998c4bba382ea8cf266d8dc0
                                                                  • Opcode Fuzzy Hash: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                                  • Instruction Fuzzy Hash: 5A510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                                  APIs
                                                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                  • 73EA4620.GDI32(00000000,00000026), ref: 0041CF2D
                                                                  • 73E98830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                                  • 73E922A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                  • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                  • 73E98830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Stretch$E98830$A4620BitsE922Mode
                                                                  • String ID:
                                                                  • API String ID: 4209919087-0
                                                                  • Opcode ID: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                  • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                                  • Opcode Fuzzy Hash: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                                  • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,?,?), ref: 00457166
                                                                    • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                    • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                    • Part of subcall function 0041EEB4: 73EA5940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571CD
                                                                  • TranslateMessage.USER32(?), ref: 004571EB
                                                                  • DispatchMessageA.USER32(?), ref: 004571F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Message$TextWindow$A5940CurrentDispatchSendThreadTranslate
                                                                  • String ID: [Paused]
                                                                  • API String ID: 1715333840-4230553315
                                                                  • Opcode ID: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                  • Instruction ID: cc82e29175726c0716c689c1ffa83d11e9869aeff1ced20ba9c80888b84e3111
                                                                  • Opcode Fuzzy Hash: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                                  • Instruction Fuzzy Hash: 013196309082489EDB11DBB5EC81FDEBBB8DB49314F5540B7F800E7292D67C9909CB69
                                                                  APIs
                                                                  • GetCursor.USER32(00000000,0046B897), ref: 0046B814
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0046B822
                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B897), ref: 0046B828
                                                                  • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B832
                                                                  • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B838
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$LoadSleep
                                                                  • String ID: CheckPassword
                                                                  • API String ID: 4023313301-1302249611
                                                                  • Opcode ID: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                  • Instruction ID: aec6a0205c5a75bc54f0fc291e1a1f9730d999611bc1887dd1e74dc6007ab6bd
                                                                  • Opcode Fuzzy Hash: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                                  • Instruction Fuzzy Hash: 333164346406049FD711EB69C889F9E7BE4EF49304F5580B6F844DB3A2D778AD40CB99
                                                                  APIs
                                                                    • Part of subcall function 00477AB0: GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                    • Part of subcall function 00477AB0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                    • Part of subcall function 00477AB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                  • SendMessageA.USER32(00000000,0000004A,00000000,00477F42), ref: 00477BBD
                                                                  • GetTickCount.KERNEL32 ref: 00477C02
                                                                  • GetTickCount.KERNEL32 ref: 00477C0C
                                                                  • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477C61
                                                                  Strings
                                                                  • CallSpawnServer: Unexpected status: %d, xrefs: 00477C4A
                                                                  • CallSpawnServer: Unexpected response: $%x, xrefs: 00477BF2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                  • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                  • API String ID: 613034392-3771334282
                                                                  • Opcode ID: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                  • Instruction ID: 65d184c56696bd8d6baefe4a5ac293f093c2dd543b1706e930bc299cdf77f89e
                                                                  • Opcode Fuzzy Hash: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                                  • Instruction Fuzzy Hash: B131A474B042149ADB11EBB988867EEB6A09F48304F90C47AF548EB392D67C9E41879D
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00459BA3
                                                                  Strings
                                                                  • Fusion.dll, xrefs: 00459B43
                                                                  • .NET Framework CreateAssemblyCache function failed, xrefs: 00459BC6
                                                                  • Failed to load .NET Framework DLL "%s", xrefs: 00459B88
                                                                  • CreateAssemblyCache, xrefs: 00459B9A
                                                                  • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00459BAE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                  • API String ID: 190572456-3990135632
                                                                  • Opcode ID: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                  • Instruction ID: 1db31b6b51e2e068c3f61674d824012408e1fbc1d182cf764eafebb5ab4ea00f
                                                                  • Opcode Fuzzy Hash: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                                  • Instruction Fuzzy Hash: EF318970E00619EBDB01EFA5C88169EB7B8AF44315F50857BE814E7382D738AE09C799
                                                                  APIs
                                                                    • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                  • GetFocus.USER32 ref: 0041C178
                                                                  • 73E9A570.USER32(?), ref: 0041C184
                                                                  • 73E98830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                                  • 73E922A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                                  • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                  • 73E98830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                                  • 73E9A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: E98830$A480A570BitsE922FocusObject
                                                                  • String ID:
                                                                  • API String ID: 2688936647-0
                                                                  • Opcode ID: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                  • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                                  • Opcode Fuzzy Hash: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                                  • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                  • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                  • 6F9A2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                    • Part of subcall function 004099C0: 6F99C400.COMCTL32(0049B628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                                  • 6FA0CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                  • 6FA0C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                  • 6FA0CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                  • 6F9A0860.COMCTL32(0049B628,00418D1F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$A0860A2980C400C740
                                                                  • String ID:
                                                                  • API String ID: 1086221473-0
                                                                  • Opcode ID: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                  • Instruction ID: e0b43fe86d74620756cf035266125a11838772e9d6ef4bcae2e69295d5b8951d
                                                                  • Opcode Fuzzy Hash: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                                  • Instruction Fuzzy Hash: A11149B1744204BBEB10EBA9DC83F5E73B8DB48704F6044BAB604E72D2DB799D409759
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004837A4), ref: 00483789
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                  • API String ID: 47109696-2530820420
                                                                  • Opcode ID: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                  • Instruction ID: 8316402a246994b7737153b66ed252a9f16b12b2be78e08e0fa98e077eb8f510
                                                                  • Opcode Fuzzy Hash: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                                  • Instruction Fuzzy Hash: 0311B1B4704244AADB10FF65CC52B5E7AE9DB41B19F60C87BA400A7282EB38CA05875C
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000,?,?,00000000), ref: 00494EE9
                                                                    • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00494F0B
                                                                  • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495489), ref: 00494F1F
                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 00494F41
                                                                  • 73E9A480.USER32(00000000,00000000,00494F6B,00494F64,?,00000000,?,?,00000000), ref: 00494F5E
                                                                  Strings
                                                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494F16
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                  • API String ID: 1435929781-222967699
                                                                  • Opcode ID: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                  • Instruction ID: 6f18d4fe6cef93123b0455e30b82395b7dbfc0c8f911bccc88a8e51c4d6277b1
                                                                  • Opcode Fuzzy Hash: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                                  • Instruction Fuzzy Hash: 95018476A04609BFEB00DBA9CC41F5EB7ECDB89704F51447AB600E7281D678AE018B28
                                                                  APIs
                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                  • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                  • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectSelect$Delete$Stretch
                                                                  • String ID:
                                                                  • API String ID: 1458357782-0
                                                                  • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                  • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                                  • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                                  • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                                  APIs
                                                                  • GetCursorPos.USER32 ref: 004233BF
                                                                  • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                  • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                  • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                  • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                  • SetCursor.USER32(00000000), ref: 00423423
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                  • String ID:
                                                                  • API String ID: 1770779139-0
                                                                  • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                  • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                                  • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                                  • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494D0C
                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494D19
                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494D26
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                  • API String ID: 667068680-2254406584
                                                                  • Opcode ID: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                  • Instruction ID: 42226921e916c2e61715a17367c32eae2b2292ab525ca03b869d6a68ec0a34c4
                                                                  • Opcode Fuzzy Hash: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                                  • Instruction Fuzzy Hash: 6CF0F69AB41B1466DA2025B68C81F7B698CCFD1B71F050337BE04A7382ED9D8D0642AD
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(03100000,BZ2_bzDecompressInit), ref: 0045D9F5
                                                                  • GetProcAddress.KERNEL32(03100000,BZ2_bzDecompress), ref: 0045DA05
                                                                  • GetProcAddress.KERNEL32(03100000,BZ2_bzDecompressEnd), ref: 0045DA15
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                  • API String ID: 190572456-212574377
                                                                  • Opcode ID: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                  • Instruction ID: e47ea2fb967bc5a05fa6d8d3c64fcba096cc564050e4d812c51f788cc71ed1ca
                                                                  • Opcode Fuzzy Hash: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                                  • Instruction Fuzzy Hash: 2BF030B0D05300DFEB24DFB29CC372336959BA4316F14803B9A0D96267D278088CCE2C
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,00480D8E), ref: 0042EA45
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                  • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA5C
                                                                    • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                    • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                    • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                  • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA70
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                  • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                  • API String ID: 142928637-2676053874
                                                                  • Opcode ID: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                  • Instruction ID: 2c8c4e1fda890c3dedf4e0e73620de090a3a9d5666271f16a874a7bcdd66483b
                                                                  • Opcode Fuzzy Hash: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                                  • Instruction Fuzzy Hash: 52E092A1741720EAEA10B7B67CC6F9A2668E714729F54403BF100A51E1C3BD1C80CE9E
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F099), ref: 0044C7FB
                                                                  • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C80C
                                                                  • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C81C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad
                                                                  • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                  • API String ID: 2238633743-1050967733
                                                                  • Opcode ID: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                  • Instruction ID: d5a6e329c062b47ae4ba9e11e7719f1ec1b45dd3e70fac445fdcae0b1af11dcb
                                                                  • Opcode Fuzzy Hash: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                                  • Instruction Fuzzy Hash: 64F0FE70246305CAFB50BBB5FDC67223694E3A4B0AF18137BE40156192D7BC4444CF4C
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                  • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                  • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                  • API String ID: 667068680-222143506
                                                                  • Opcode ID: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                  • Instruction ID: 8ade474bf949b7c868f23be577f60042bf37b8b7e1302e6d2b868e4e2d48ad49
                                                                  • Opcode Fuzzy Hash: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                                  • Instruction Fuzzy Hash: D4C0E9F0AC1740EEAA00E7F15CDAD762558D514B34724943F754DAA193D97D58044A2C
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 0041B58E
                                                                  • 73E9A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                                  • 73EA4620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                                  • 73ECE680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                                  • 73ECE680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                                  • 73E9A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: E680$A4620A480A570Focus
                                                                  • String ID:
                                                                  • API String ID: 2226671993-0
                                                                  • Opcode ID: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                  • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                                  • Opcode Fuzzy Hash: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                                  • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                                  APIs
                                                                  • SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                  • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D4E8,?,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D45A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                  • API String ID: 1452528299-1580325520
                                                                  • Opcode ID: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                  • Instruction ID: bfdb5615fdc952ab51c5d4d36cfcdc52ba3649a349ed7733e19bd606ff263fd4
                                                                  • Opcode Fuzzy Hash: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                                  • Instruction Fuzzy Hash: A6117835A04204ABD731DE95C941A5E76DCDF46306F608077AD0596283D67C6F0A952A
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                  • 73E9A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                                  • 73EA4620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                                  • 73EA4620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                                  • 73E9A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: A4620MetricsSystem$A480A570
                                                                  • String ID:
                                                                  • API String ID: 4120540252-0
                                                                  • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                  • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                                  • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                                  • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                  APIs
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0047E272
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CFF1), ref: 0047E298
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0047E2A8
                                                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E2C9
                                                                  • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E2DD
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E2F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long$Show
                                                                  • String ID:
                                                                  • API String ID: 3609083571-0
                                                                  • Opcode ID: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                  • Instruction ID: 64a3e6c2176d4acc74ea6130292171d5cd043058eec335b926c35577e1896bc6
                                                                  • Opcode Fuzzy Hash: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                                  • Instruction Fuzzy Hash: DE010CB5651210ABE600D769DE41F66379CAB0D334F0503AAB959DF2E3C729EC009B49
                                                                  APIs
                                                                    • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                  • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                  • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                  • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                    • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                  • String ID:
                                                                  • API String ID: 3527656728-0
                                                                  • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                  • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                                  • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                                  • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                                  APIs
                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                  • ShowWindow.USER32(?,00000005,00000000,00497991,?,?,00000000), ref: 00497762
                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                    • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                    • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                  • String ID: .dat$.msg$IMsg$Uninstall
                                                                  • API String ID: 3312786188-1660910688
                                                                  • Opcode ID: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                  • Instruction ID: bbf2e7f3574d42a9113524bdb42c94a944b0e97273f2a70b882bd080beededf8
                                                                  • Opcode Fuzzy Hash: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                                  • Instruction Fuzzy Hash: 8E318F74A10214AFDB00EF65DC82D6E7BB5EB89318B51847AF800AB392D739BD01CB58
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                  • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                  • API String ID: 828529508-2866557904
                                                                  • Opcode ID: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                  • Instruction ID: f5c55ae169209784706469d1b6e96428d25835975ad7b3a5622eb1d8c2489c6d
                                                                  • Opcode Fuzzy Hash: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                                  • Instruction Fuzzy Hash: 2DF022E078062136E620E2BFACC3F6B498C8FA0725F040436F009EA2C2E92C9900422E
                                                                  APIs
                                                                  • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                  • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                  • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                  • String ID: \]
                                                                  • API String ID: 730355536-3890588557
                                                                  • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                  • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                  • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                  • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                  APIs
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457E64
                                                                  • GetExitCodeProcess.KERNEL32(?,00498116), ref: 00457E85
                                                                  • CloseHandle.KERNEL32(?,00457EB8,?,?,004586D3,00000000,00000000), ref: 00457EAB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                  • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                  • API String ID: 2573145106-3235461205
                                                                  • Opcode ID: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                  • Instruction ID: 6a931132ee958b8202ab537f65b64b7fb4871f4dbf11571726e28c2ddef09419
                                                                  • Opcode Fuzzy Hash: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                                  • Instruction Fuzzy Hash: 1101A735604704AFDB11EB999D43A1E77A8DB49711F5004B6FC10E73D3D63C9D048618
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                  • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                                                  • API String ID: 3478007392-2498399450
                                                                  • Opcode ID: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                  • Instruction ID: 5ef4959e42d5312267b3952f4de6be483a2b5690063b138e9708ef51bd19b1c3
                                                                  • Opcode Fuzzy Hash: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                                  • Instruction Fuzzy Hash: A3E0ECB1741314EADA106B62BECBF5A2558E724B15F54043BF101751F2C7BD2C80C95E
                                                                  APIs
                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                  • String ID: AllowSetForegroundWindow$user32.dll
                                                                  • API String ID: 1782028327-3855017861
                                                                  • Opcode ID: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                  • Instruction ID: 8233eca9c26ae86130ab8a2651ceb45e7b9436c82c984da63702dcb6f06a18e2
                                                                  • Opcode Fuzzy Hash: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                                  • Instruction Fuzzy Hash: 27D0A7A0208300A6ED10F3F14C47E6F224C8D847587A4C43B7404E3182CABCE900993C
                                                                  APIs
                                                                  • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                  • SaveDC.GDI32(?), ref: 00416C93
                                                                  • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                  • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                  • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                  • String ID:
                                                                  • API String ID: 3808407030-0
                                                                  • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                  • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                                  • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                                  • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                  • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                  • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                  • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                  • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                  • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                  • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                  • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                                  • Opcode Fuzzy Hash: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                                  • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                  • 73E9A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                                  • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                                  • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$A570A6310DeleteObject
                                                                  • String ID:
                                                                  • API String ID: 3435189566-0
                                                                  • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                  • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                                  • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                                  • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                                  APIs
                                                                    • Part of subcall function 0045D3B0: SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738D5
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738EB
                                                                  Strings
                                                                  • Could not set permissions on the registry key because it currently does not exist., xrefs: 004738DF
                                                                  • Setting permissions on registry key: %s\%s, xrefs: 0047389A
                                                                  • Failed to set permissions on registry key (%d)., xrefs: 004738FC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                  • API String ID: 1452528299-4018462623
                                                                  • Opcode ID: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                  • Instruction ID: 0e56c8fb080e82cb73bff42131c1910bc7e2d1be1188aa0d4929b19add272574
                                                                  • Opcode Fuzzy Hash: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                                  • Instruction Fuzzy Hash: D42186B0A046485FCB00DFA9C8816EEBBE5DF49315F50817BE508E7392D7B85A05CB6A
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                  • String ID:
                                                                  • API String ID: 262959230-0
                                                                  • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                  • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                  • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                                  • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                  APIs
                                                                  • 73E98830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                  • 73E922A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                                  • 73E98830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                                  • 73E922A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                                  • 73E9A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: E922E98830$A480
                                                                  • String ID:
                                                                  • API String ID: 3692852386-0
                                                                  • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                  • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                                  • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                                  • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                                  APIs
                                                                  • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                                  • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                                  • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Enum$NameOpenResourceUniversal
                                                                  • String ID: Z
                                                                  • API String ID: 3604996873-1505515367
                                                                  • Opcode ID: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                  • Instruction ID: 2ace50d644c075eff23e32fa5e1ddfe03b8fa53596be5d4ceb5675c655e146ae
                                                                  • Opcode Fuzzy Hash: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                                  • Instruction Fuzzy Hash: C0513070E04218ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE418F5A
                                                                  APIs
                                                                  • SetRectEmpty.USER32(?), ref: 0044D05E
                                                                  • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D089
                                                                  • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D111
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: DrawText$EmptyRect
                                                                  • String ID:
                                                                  • API String ID: 182455014-2867612384
                                                                  • Opcode ID: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                  • Instruction ID: 2c2bbb7fbf4b59eae95d31c7b28000ca71a9f0321ec4255fb332cd8a4a3f7a8e
                                                                  • Opcode Fuzzy Hash: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                                  • Instruction Fuzzy Hash: F6516071E00244AFDB10DFA5C885BDEBBF8AF49308F08847AE845EB255D778A945CB64
                                                                  APIs
                                                                  • 73E9A570.USER32(00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EFAE
                                                                    • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                  • SelectObject.GDI32(?,00000000), ref: 0042EFD1
                                                                  • 73E9A480.USER32(00000000,?,0042F0BD,00000000,0042F0B6,?,00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000), ref: 0042F0B0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: A480A570CreateFontIndirectObjectSelect
                                                                  • String ID: ...\
                                                                  • API String ID: 2998766281-983595016
                                                                  • Opcode ID: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                  • Instruction ID: 4ea51e63949933808241df29427b07dd96e06abf1a704ffa26f869fa6ec4a11f
                                                                  • Opcode Fuzzy Hash: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                                  • Instruction Fuzzy Hash: 2F315270B00128ABDF11EF96D841BAEB7B8EB48708FD1447BF410A7292D7785D49CA59
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateFileHandle
                                                                  • String ID: .tmp$_iu
                                                                  • API String ID: 3498533004-10593223
                                                                  • Opcode ID: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                  • Instruction ID: 4fa05f029f2566c48aedd37e5d2d112a05e3774389c58111587f2dbaaee79b9c
                                                                  • Opcode Fuzzy Hash: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                                  • Instruction Fuzzy Hash: 9531A6B0A40149ABCF01EF95C982B9EBBB5AF44345F50452AF800B72C2D6785F058AAD
                                                                  APIs
                                                                  • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                  • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                  • RegisterClassA.USER32(?), ref: 004164DE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Class$InfoRegisterUnregister
                                                                  • String ID: @
                                                                  • API String ID: 3749476976-2766056989
                                                                  • Opcode ID: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                  • Instruction ID: 7ea39428e622c43f80c69b44bdb33f9ce6dea52ad5211df5dc1c1138561595a4
                                                                  • Opcode Fuzzy Hash: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                                  • Instruction Fuzzy Hash: 0E318E706042009BD760EF68C981B9B77E5AB88308F04457FF985DB392DB39D9848B6A
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C50
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C79
                                                                  • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00497C92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: File$Attributes$Move
                                                                  • String ID: isRS-%.3u.tmp
                                                                  • API String ID: 3839737484-3657609586
                                                                  • Opcode ID: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                  • Instruction ID: 213244b736f3eff521ec2db090c728ece63042f248bf50699bdf4cb02408e53f
                                                                  • Opcode Fuzzy Hash: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                                  • Instruction Fuzzy Hash: 53214171E14219AFCF05EFA9C881AAFBBB8AB44714F50453BB814B72D1D6385E018B69
                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                  • ExitProcess.KERNEL32 ref: 00404E0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ExitMessageProcess
                                                                  • String ID: Error$Runtime error at 00000000
                                                                  • API String ID: 1220098344-2970929446
                                                                  • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                  • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                  • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                  • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                  APIs
                                                                    • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A88
                                                                  • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456AB5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                  • String ID: LoadTypeLib$RegisterTypeLib
                                                                  • API String ID: 1312246647-2435364021
                                                                  • Opcode ID: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                  • Instruction ID: 5567ca09ff2ddd9e87874ef4cfa4ab968baaa8f1c3db1669d027a8a21fc87fa6
                                                                  • Opcode Fuzzy Hash: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                                  • Instruction Fuzzy Hash: 20119331B00604AFDB11EFA6CD55A5EB7BDEB8A705B51C4B6BC04E3652DA389E04CB24
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456FA6
                                                                  • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457043
                                                                  Strings
                                                                  • Failed to create DebugClientWnd, xrefs: 0045700C
                                                                  • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                  • API String ID: 3850602802-3720027226
                                                                  • Opcode ID: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                  • Instruction ID: 61f5065308a022425a12d25e559eb7300ab1b4b0d104b50eccf394a1c4e119f6
                                                                  • Opcode Fuzzy Hash: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                                  • Instruction Fuzzy Hash: 921123706082509BD300AB689C82B5F7BD89B55719F45403BF9859B3C3D7798C08C7AE
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000,00495E13), ref: 00495DDE
                                                                  • CloseHandle.KERNEL32(x^I,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000), ref: 00495DF5
                                                                    • Part of subcall function 00495CC8: GetLastError.KERNEL32(00000000,00495D60,?,?,?,?), ref: 00495CEC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateErrorHandleLastProcess
                                                                  • String ID: D$x^I
                                                                  • API String ID: 3798668922-903578107
                                                                  • Opcode ID: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                  • Instruction ID: 0d7d1bccb2b79611993d32b5dcf50d38d0c3e5c5098d5d0063742a7482510134
                                                                  • Opcode Fuzzy Hash: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                                  • Instruction Fuzzy Hash: F201A1B1604648AFDF01EBA2DC42E9FBBACDF08704F60003AF904E72C1D6385E008A28
                                                                  APIs
                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                  • GetFocus.USER32 ref: 00478673
                                                                  • GetKeyState.USER32(0000007A), ref: 00478685
                                                                  • WaitMessage.USER32(?,00000000,004786AC,?,00000000,004786D3,?,?,00000001,00000000,?,?,?,0047FED4,00000000,00480D8E), ref: 0047868F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: FocusMessageStateTextWaitWindow
                                                                  • String ID: Wnd=$%x
                                                                  • API String ID: 1381870634-2927251529
                                                                  • Opcode ID: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                  • Instruction ID: ef44951ba698f020dd2967180cd2d6f5e0b89f016f08406409eb47c9a327eab3
                                                                  • Opcode Fuzzy Hash: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                                  • Instruction Fuzzy Hash: 2411A374644244BFC700EF65DD45A9E7BF8EB49714B5184BAF408E3691DB38AE00CA6E
                                                                  APIs
                                                                  • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E8C0
                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E8CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Time$File$LocalSystem
                                                                  • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                  • API String ID: 1748579591-1013271723
                                                                  • Opcode ID: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                  • Instruction ID: 5dd70de3b3cbc2db986134396dd9c806d54cb2705fd1511918c86a199fc004ed
                                                                  • Opcode Fuzzy Hash: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                                  • Instruction Fuzzy Hash: 1711F8A440C3919AD340DF2AC44432BBBE4AF89704F44892EF9D8D6381E779C948DB77
                                                                  APIs
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F6F
                                                                    • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F94
                                                                    • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesDeleteErrorLastMove
                                                                  • String ID: DeleteFile$MoveFile
                                                                  • API String ID: 3024442154-139070271
                                                                  • Opcode ID: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                  • Instruction ID: b42c41819cc20c1867e4fcb1ab4fb5766129ddbc0fc5112b2d6697d8e42203d6
                                                                  • Opcode Fuzzy Hash: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                                  • Instruction Fuzzy Hash: 49F062716041455AEB01FAA5D84266EA3ECDB8430BFA0403BB800BB6C3DA3C9E09493D
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483685
                                                                  • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004836A8
                                                                  Strings
                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 00483652
                                                                  • CSDVersion, xrefs: 0048367C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                  • API String ID: 3677997916-1910633163
                                                                  • Opcode ID: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                  • Instruction ID: 3c550b8be62ae6962ae8a8b2bb2136c6a1766c1456238aff6c9f059f5d92f743
                                                                  • Opcode Fuzzy Hash: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                                  • Instruction Fuzzy Hash: B1F06D75E00208B6DF20EED88C45BAFB3BCAF14B05F204566E910E7381F6789B448B59
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                  • API String ID: 47109696-2631785700
                                                                  • Opcode ID: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                  • Instruction ID: 5fc53f2980ca067f7fdefaa7aa50a153e5e830959166a8c5adde0da5508e813c
                                                                  • Opcode Fuzzy Hash: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                                  • Instruction Fuzzy Hash: 97F0AF35720150DBCB10EF5AE885B4E6298DB99396F50403BB985CB263C77CCC06CA99
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B46,00000000,00453BE9,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FD9,00000000), ref: 0042D91A
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                  • API String ID: 1646373207-4063490227
                                                                  • Opcode ID: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                  • Instruction ID: 1097081faf8e12b72459453f22f39748745641366cc83a46a0cb0e3cd7246884
                                                                  • Opcode Fuzzy Hash: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                                  • Instruction Fuzzy Hash: 5FE04FE1B40B1112D71066BA5C82B6B158E4B84724F90443B3994E62C3DDBCD9885A5D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                  • API String ID: 1646373207-260599015
                                                                  • Opcode ID: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                  • Instruction ID: 186c8a8b24504359f9bd95d8817b94a00a7cf61d77d8ea7090d5fad6c77db3b3
                                                                  • Opcode Fuzzy Hash: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                                  • Instruction Fuzzy Hash: 1CD0C792312732666D10F1F73CD1DBB098C89116753544477F505E5241D55DDD01196D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: NotifyWinEvent$user32.dll
                                                                  • API String ID: 1646373207-597752486
                                                                  • Opcode ID: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                  • Instruction ID: adaf68bc035e952e092e397114f6a1653fed54d9058db7208dfb757fc5d15743
                                                                  • Opcode Fuzzy Hash: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                                  • Instruction Fuzzy Hash: F7E012F4E417049DEF00BBF5BA86B1E3A90E764718B01417FF404A62A2DB7C440C8E5D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                  • API String ID: 1646373207-834958232
                                                                  • Opcode ID: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                  • Instruction ID: 7eda4cb16e2cba450c320cc229382d7be1fc12bfd2fbc27455de3eb8489cf644
                                                                  • Opcode Fuzzy Hash: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                                  • Instruction Fuzzy Hash: 88B092C128174298AC7032FA0C02A1F08084882F28718083F3C48F50C2CD6ED804182D
                                                                  APIs
                                                                    • Part of subcall function 0044B668: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                    • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                                  • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                  • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad
                                                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                  • API String ID: 2238633743-2683653824
                                                                  • Opcode ID: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                  • Instruction ID: ef62b78e1ecbbf86accf82cc5e54c74759ffbda80f6f2c7107c350d82a6c33f4
                                                                  • Opcode Fuzzy Hash: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                                  • Instruction Fuzzy Hash: 48B092E06E2700A88E00B7FA2887B0B104895D0B1DB56063F704979092EB7C4008CD6E
                                                                  APIs
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E), ref: 0047D484
                                                                  • FindClose.KERNEL32(000000FF,0047D4AF,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E,00000000), ref: 0047D4A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileNext
                                                                  • String ID:
                                                                  • API String ID: 2066263336-0
                                                                  • Opcode ID: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                  • Instruction ID: 2979fa4f850f67a6d1e6d53d287e6b8f4dfe67a5ddfa55c2aaa4ecb03bfc0e13
                                                                  • Opcode Fuzzy Hash: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                                  • Instruction Fuzzy Hash: CA812D70D0024DAFDF11DFA5CC55ADFBBB9EF49308F5080AAE808A7291D6399A46CF54
                                                                  APIs
                                                                    • Part of subcall function 0042EE40: GetTickCount.KERNEL32 ref: 0042EE46
                                                                    • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                  • GetLastError.KERNEL32(00000000,00475991,?,?,0049C1D0,00000000), ref: 0047587A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CountErrorFileLastMoveTick
                                                                  • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                  • API String ID: 2406187244-2685451598
                                                                  • Opcode ID: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                  • Instruction ID: 8ae0701305b01ce1bca9537847079d861391bf026d2cb8563746cd807755024f
                                                                  • Opcode Fuzzy Hash: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                                  • Instruction Fuzzy Hash: BB4166B0A006098FDB10EFA5D882ADE77B5EF48314F60853BE514BB351D7789A058BA9
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 00413D56
                                                                  • GetDesktopWindow.USER32 ref: 00413E0E
                                                                    • Part of subcall function 00418ED0: 6FA0C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418EEC
                                                                    • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418F09
                                                                  • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CursorDesktopWindow$Show
                                                                  • String ID:
                                                                  • API String ID: 2074268717-0
                                                                  • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                  • Instruction ID: 95de96b99ba854305cf3f6c98da1fc171ffd9c3687d173b50ed20deed18b133b
                                                                  • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                                  • Instruction Fuzzy Hash: 59411F75600250AFC710DF2AFA85B5677E1EB64319F15817BE404CB365DB38AD81CF98
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                                  • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                                  • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: LoadString$FileMessageModuleName
                                                                  • String ID:
                                                                  • API String ID: 704749118-0
                                                                  • Opcode ID: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                  • Instruction ID: 11344639af0fa1b95b6fef638a25282c94d515b30ba3ed4b3402aedba36e13da
                                                                  • Opcode Fuzzy Hash: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                                  • Instruction Fuzzy Hash: 843133706083849ED330EA658945B9F77D89B85304F40483FF6C8D72D1DB79A9048B67
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E91D
                                                                    • Part of subcall function 0044CF60: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF92
                                                                  • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E9A1
                                                                    • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                  • IsRectEmpty.USER32(?), ref: 0044E963
                                                                  • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E986
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                  • String ID:
                                                                  • API String ID: 855768636-0
                                                                  • Opcode ID: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                  • Instruction ID: 03991ef50c1cdc1947edd1d0bf9da16660927dd763c0b41cb42d654f0fd6bbd7
                                                                  • Opcode Fuzzy Hash: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                                  • Instruction Fuzzy Hash: 47113871B5030027E250AA7A9C86B5B76899B88748F14093FB546EB3C7EE7DDC09429D
                                                                  APIs
                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00495358
                                                                  • OffsetRect.USER32(?,00000000,?), ref: 00495373
                                                                  • OffsetRect.USER32(?,?,00000000), ref: 0049538D
                                                                  • OffsetRect.USER32(?,00000000,?), ref: 004953A8
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: OffsetRect
                                                                  • String ID:
                                                                  • API String ID: 177026234-0
                                                                  • Opcode ID: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                  • Instruction ID: af1c1dfc71d00ff4a9a929e8d6bf6bfabc08d13bc1b1844b1e7d273cf48c6b2a
                                                                  • Opcode Fuzzy Hash: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                                  • Instruction Fuzzy Hash: 94217CB6700701ABD700DE69CD85E5BB7DEEBC4344F24CA2AF954C7249D634ED0487A6
                                                                  APIs
                                                                  • GetCursorPos.USER32 ref: 00417270
                                                                  • SetCursor.USER32(00000000), ref: 004172B3
                                                                  • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                  • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                  • String ID:
                                                                  • API String ID: 1959210111-0
                                                                  • Opcode ID: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                  • Instruction ID: a2974bbdd40a4ad71efed6c963999b1e78101043f5dd1c0306289f7dfca9f025
                                                                  • Opcode Fuzzy Hash: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                                  • Instruction Fuzzy Hash: 4321A1313082018BCB20AB69E985AE733B1EF44754B0545ABF854CB352D73CDC82CB89
                                                                  APIs
                                                                  • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494FC1
                                                                  • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494FD5
                                                                  • MulDiv.KERNEL32(F70577E8,00000008,?), ref: 00494FE9
                                                                  • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495007
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                  • Instruction ID: c81a7ae82503e1df060b9d2e8e6c822c04bb2cec442f3182d8fec1f0f0e8f71f
                                                                  • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                  • Instruction Fuzzy Hash: 48112472604204ABCF50DE99C8C4D9B7BECEF4D320B1541A6F918DB246D674DD408BA4
                                                                  APIs
                                                                  • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                  • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                  • RegisterClassA.USER32(00499598), ref: 0041F4E4
                                                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                  • String ID:
                                                                  • API String ID: 4025006896-0
                                                                  • Opcode ID: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                  • Instruction ID: e8d232a05c88a2160d81946a52d6ac90de0a8bd7e5396313334bc6410d622602
                                                                  • Opcode Fuzzy Hash: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                                  • Instruction Fuzzy Hash: 7B011B722401047BDA10EB6DED81E9B3799D719314B11413BBA15E72A1D7369C154BAC
                                                                  APIs
                                                                  • WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                  • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                  • CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                  • String ID:
                                                                  • API String ID: 4071923889-0
                                                                  • Opcode ID: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                  • Instruction ID: 44a5693fa59bfbe72ab063cfacecacb9b789a88f4d4f9747d0667cdf65a63c8e
                                                                  • Opcode Fuzzy Hash: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                                  • Instruction Fuzzy Hash: 7201F9716046087EEB20979E8C06F6B7BACDF44774F610167F904DB2C2C6785D40C668
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                                  • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4,0000000A,REGDLL_EXE), ref: 0040D241
                                                                  • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4), ref: 0040D25B
                                                                  • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                  • String ID:
                                                                  • API String ID: 3473537107-0
                                                                  • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                  • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                                  • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                                  • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,\],?,?,?,004018B4), ref: 00401566
                                                                  • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,\],?,?,?,004018B4), ref: 0040158B
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,\],?,?,?,004018B4), ref: 004015B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Alloc$Free
                                                                  • String ID: \]
                                                                  • API String ID: 3668210933-3890588557
                                                                  • Opcode ID: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                  • Instruction ID: ed10fda1d5a177d2a0c43996bc0be7fa2989f050302610c9045c0a13ae1d279a
                                                                  • Opcode Fuzzy Hash: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                  • Instruction Fuzzy Hash: AFF0C8716403206AEB315A294C85F133AD4DBC5754F104075BE09FF3DAD6B8980082AC
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,00000000), ref: 004700ED
                                                                  Strings
                                                                  • Setting NTFS compression on directory: %s, xrefs: 004700BB
                                                                  • Failed to set NTFS compression state (%d)., xrefs: 004700FE
                                                                  • Unsetting NTFS compression on directory: %s, xrefs: 004700D3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                  • API String ID: 1452528299-1392080489
                                                                  • Opcode ID: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                  • Instruction ID: 8e5543267561a70d3fbbbef991b1365390ff1382f756d9cdf86c8bb39141f558
                                                                  • Opcode Fuzzy Hash: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                                  • Instruction Fuzzy Hash: C9011730E0928C96CF05D7ADA0412DDBBF4DF4D314F84C1AFA45DE7282DA790609879A
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 00470899
                                                                  Strings
                                                                  • Unsetting NTFS compression on file: %s, xrefs: 0047087F
                                                                  • Setting NTFS compression on file: %s, xrefs: 00470867
                                                                  • Failed to set NTFS compression state (%d)., xrefs: 004708AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                  • API String ID: 1452528299-3038984924
                                                                  • Opcode ID: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                  • Instruction ID: 78fa65e16581c334b53b8e167e27839d8ecb3154876bc13dabe901d18edf2e93
                                                                  • Opcode Fuzzy Hash: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                                  • Instruction Fuzzy Hash: 5C01F430D092489ADB04A7E9A4412EDBBF49F09314F45C1ABA459E7282DAB9050947DB
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000,0045BB39), ref: 00455DC4
                                                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000), ref: 00455DCD
                                                                  • RemoveFontResourceA.GDI32(00000000), ref: 00455DDA
                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DEE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                  • String ID:
                                                                  • API String ID: 4283692357-0
                                                                  • Opcode ID: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                  • Instruction ID: 88a6b2d0cd2ebf9d052afffcb5c4be27c29a8e8e48dcb03e602a07ae18d4e81c
                                                                  • Opcode Fuzzy Hash: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                                  • Instruction Fuzzy Hash: E3F05EB6B4470176EA10B6B69C8BF2B229C9F54745F10883BBA00EF2C3D97CDC04962D
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CountSleepTick
                                                                  • String ID:
                                                                  • API String ID: 2227064392-0
                                                                  • Opcode ID: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                  • Instruction ID: e9c2c7e2fc271270d41d52dba3350464f1e42bdffd51bbfd166b1ef271046f5a
                                                                  • Opcode Fuzzy Hash: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                                  • Instruction Fuzzy Hash: 93E02B7130964845CA24B2BE28C37BF4A88CB8536AB14453FF08CD6242C42C4D05956E
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB,00000000), ref: 00478129
                                                                  • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0047812F
                                                                  • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478151
                                                                  • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478162
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                  • String ID:
                                                                  • API String ID: 215268677-0
                                                                  • Opcode ID: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                  • Instruction ID: 3331d84468cd062744280f6e1aa24963878bc2b2d96e3aea022572b3ec77581d
                                                                  • Opcode Fuzzy Hash: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                                  • Instruction Fuzzy Hash: 70F030716843016BD600EAB5CC82E9B77DCEB44754F04893E7E98D72C1DA79DC08AB66
                                                                  APIs
                                                                  • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                  • IsWindowVisible.USER32(?), ref: 0042426D
                                                                  • IsWindowEnabled.USER32(?), ref: 00424277
                                                                  • SetForegroundWindow.USER32(?), ref: 00424281
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                  • String ID:
                                                                  • API String ID: 2280970139-0
                                                                  • Opcode ID: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                  • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                                  • Opcode Fuzzy Hash: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                                  • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                                  APIs
                                                                  • GlobalHandle.KERNEL32 ref: 00406287
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                                  • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocHandleLockUnlock
                                                                  • String ID:
                                                                  • API String ID: 2167344118-0
                                                                  • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                  • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                  • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                  • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                  APIs
                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B8D5,?,00000000,00000000,00000001,00000000,0047A301,?,00000000), ref: 0047A2C5
                                                                  Strings
                                                                  • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A139
                                                                  • Failed to parse "reg" constant, xrefs: 0047A2CC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                  • API String ID: 3535843008-1938159461
                                                                  • Opcode ID: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                  • Instruction ID: 3bf0094b3715a844c7fa4d69accdb7e726d223c3dcefaf8b2e4f531663087c06
                                                                  • Opcode Fuzzy Hash: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                                  • Instruction Fuzzy Hash: 5F814174E00149AFCB10DF95D881ADEBBF9EF48314F5081AAE814B7392D7389E05CB99
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483045
                                                                  • SetActiveWindow.USER32(?,00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483057
                                                                  Strings
                                                                  • Will not restart Windows automatically., xrefs: 00483176
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveForeground
                                                                  • String ID: Will not restart Windows automatically.
                                                                  • API String ID: 307657957-4169339592
                                                                  • Opcode ID: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                  • Instruction ID: df9a9ae9a8219d8b6a1298420550b74bcee7fa449f44545fa147fc9774bd32fa
                                                                  • Opcode Fuzzy Hash: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                                  • Instruction Fuzzy Hash: A7413330208340AED710FFA4DC9AB6E3BA4DB15F05F1408B7E9404B3A2D6BD5A04DB1D
                                                                  Strings
                                                                  • Failed to proceed to next wizard page; aborting., xrefs: 0046CFCC
                                                                  • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CFE0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                  • API String ID: 0-1974262853
                                                                  • Opcode ID: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                  • Instruction ID: 63d40b18a6e87dbc706e62a2b7ed59e25ea13cd94e581da409b3f01416405f56
                                                                  • Opcode Fuzzy Hash: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                                  • Instruction Fuzzy Hash: 9A319E30A08244DFD711EB99D989BA977F6EB05308F1500FBF0489B392D779AE40CB1A
                                                                  APIs
                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                                  • RegCloseKey.ADVAPI32(?,00478E9A,?,?,00000001,00000000,00000000,00478EB5), ref: 00478E83
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478E0E
                                                                  • %s\%s_is1, xrefs: 00478E2C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                  • API String ID: 47109696-1598650737
                                                                  • Opcode ID: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                  • Instruction ID: 403b8390735a8e98fed73365c843d129082673b7d0193522817cb9849c55968d
                                                                  • Opcode Fuzzy Hash: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                                  • Instruction Fuzzy Hash: 79218470B40208AFDB01DFAACC55A9EBBE8EB48304F90847EE904E7381DB785D018A59
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501E9
                                                                  • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045021A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ExecuteMessageSendShell
                                                                  • String ID: open
                                                                  • API String ID: 812272486-2758837156
                                                                  • Opcode ID: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                  • Instruction ID: 6e2feb9b457cb976a84d54f3b3258ed3b08e14d6ba220cef3ebd8abcd6e201e4
                                                                  • Opcode Fuzzy Hash: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                                  • Instruction Fuzzy Hash: 62219474E40208AFDB00DFA5C886B9EB7F8EB44705F2081BAB514E7282D7789E05CB58
                                                                  APIs
                                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00455318
                                                                  • GetLastError.KERNEL32(0000003C,00000000,00455361,?,?,00000001,00000001), ref: 00455329
                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryErrorExecuteLastShellSystem
                                                                  • String ID: <
                                                                  • API String ID: 893404051-4251816714
                                                                  • Opcode ID: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                  • Instruction ID: ea799879bbb6ab716a70283d096866571a468ac1fa4b8cc73728b10af3e72d10
                                                                  • Opcode Fuzzy Hash: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                                  • Instruction Fuzzy Hash: 02215370A00609ABDB10DFA5D8926AE7BF8AF18355F50443AFC44E7281D7789949CB58
                                                                  APIs
                                                                  • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                  • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02179364,00001860,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                  • String ID: )
                                                                  • API String ID: 2227675388-1084416617
                                                                  • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                  • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                  • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                  • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496539
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Window
                                                                  • String ID: /INITPROCWND=$%x $@
                                                                  • API String ID: 2353593579-4169826103
                                                                  • Opcode ID: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                  • Instruction ID: 8ac61a852f64af84e8a4d996ffe215da0ea6a1f7c0dd4c2642a2787a2d41e8fe
                                                                  • Opcode Fuzzy Hash: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                                  • Instruction Fuzzy Hash: C711A531A043089FDB01DF64E855BAE7BE8EB48324F52847BE404E7281DB3CE905CA58
                                                                  APIs
                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • SysFreeString.OLEAUT32(?), ref: 004474D6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: String$AllocByteCharFreeMultiWide
                                                                  • String ID: NIL Interface Exception$Unknown Method
                                                                  • API String ID: 3952431833-1023667238
                                                                  • Opcode ID: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                  • Instruction ID: aafd2560cbf8ba646f5ae6954b41d26adab4393ec7197c17a1bba45f9511721b
                                                                  • Opcode Fuzzy Hash: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                                  • Instruction Fuzzy Hash: 0811D6306042049FEB10DFA59D42A6EBBACEB49704F91403AF504E7681C7789D01CB69
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Value$EnumQuery
                                                                  • String ID: Inno Setup: No Icons
                                                                  • API String ID: 1576479698-2016326496
                                                                  • Opcode ID: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                  • Instruction ID: 05ef73584c9e0c756a5fead926ccd29af3c260b6948a855c27afe474e1c18ecb
                                                                  • Opcode Fuzzy Hash: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                                  • Instruction Fuzzy Hash: B2012B36F5A77179F73046256D02BBB56888B82B60F68453BF940EA2C0D6589C04C36E
                                                                  APIs
                                                                    • Part of subcall function 004555D0: GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                    • Part of subcall function 004555D0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                                  • SetForegroundWindow.USER32(?), ref: 00497266
                                                                  Strings
                                                                  • Restarting Windows., xrefs: 00497243
                                                                  • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497291
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                  • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                  • API String ID: 3179053593-4147564754
                                                                  • Opcode ID: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                  • Instruction ID: f042dff5c045186d33be5417afa4f05d679b9763972d2bb00463d131ea403ed4
                                                                  • Opcode Fuzzy Hash: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                                  • Instruction Fuzzy Hash: FD01D8706282406BEB00EB65E981B9C3F99AB5430CF5040BBF900A72D3D73C9945871D
                                                                  APIs
                                                                    • Part of subcall function 0047CD84: FreeLibrary.KERNEL32(74A90000,004814B7), ref: 0047CD9A
                                                                    • Part of subcall function 0047CA54: GetTickCount.KERNEL32 ref: 0047CA9E
                                                                    • Part of subcall function 004570CC: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570EB
                                                                  • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049832B), ref: 00497A29
                                                                  • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049832B), ref: 00497A2F
                                                                  Strings
                                                                  • Detected restart. Removing temporary directory., xrefs: 004979E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                  • String ID: Detected restart. Removing temporary directory.
                                                                  • API String ID: 1717587489-3199836293
                                                                  • Opcode ID: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                  • Instruction ID: 93f06bea8fcfa1b224d7ac257058da4e76460d04d1e35911cc499d3d1c0dfa98
                                                                  • Opcode Fuzzy Hash: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                                  • Instruction Fuzzy Hash: 51E0553120C3002EDA02B7B2BC52A2F7F8CD701728311083BF40882452C43D1810C77D
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.3383055145.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.3382996228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383320369.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383411799.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383442504.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.3383511309.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_Xzm9fAfKhB.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastSleep
                                                                  • String ID:
                                                                  • API String ID: 1458359878-0
                                                                  • Opcode ID: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                  • Instruction ID: a2606c7dd4c17da0a3c90c20a229de96912268129783a4208f21052e6a4fbdd3
                                                                  • Opcode Fuzzy Hash: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                                  • Instruction Fuzzy Hash: 62F02436B01D64578F20A59E998193F63DDEA94376750013BFC0CDB303D438CC098AA9

                                                                  Execution Graph

                                                                  Execution Coverage:3.6%
                                                                  Dynamic/Decrypted Code Coverage:83.4%
                                                                  Signature Coverage:4.3%
                                                                  Total number of Nodes:2000
                                                                  Total number of Limit Nodes:40
                                                                  execution_graph 18743 40d440 18744 40d1b6 18743->18744 18745 40d456 RegCloseKey 18744->18745 18746 40d44f 18744->18746 18745->18746 18747 402342 18748 402810 CopyFileA 18747->18748 18750 40d601 18748->18750 18751 40d243 18752 40d5c1 RegSetValueExA RegCloseKey 18751->18752 18753 40d5d0 18752->18753 19379 401f64 FindResourceA 19380 401f86 GetLastError SizeofResource 19379->19380 19386 401f9f 19379->19386 19381 401fa6 LoadResource LockResource GlobalAlloc 19380->19381 19380->19386 19382 401fd2 19381->19382 19383 401ffb GetTickCount 19382->19383 19385 402005 GlobalAlloc 19383->19385 19385->19386 19387 402865 19388 40d62b Sleep 19387->19388 19389 40d697 19388->19389 18754 2c5104d 18759 2c63384 18754->18759 18765 2c63288 18759->18765 18761 2c51057 18762 2c51aa9 InterlockedIncrement 18761->18762 18763 2c51ac5 WSAStartup InterlockedExchange 18762->18763 18764 2c5105c 18762->18764 18763->18764 18766 2c63294 __getstream 18765->18766 18773 2c68572 18766->18773 18772 2c632bb __getstream 18772->18761 18790 2c688cd 18773->18790 18775 2c6329d 18776 2c632cc RtlDecodePointer RtlDecodePointer 18775->18776 18777 2c632a9 18776->18777 18778 2c632f9 18776->18778 18787 2c632c6 18777->18787 18778->18777 19089 2c6913d 18778->19089 18780 2c6335c RtlEncodePointer RtlEncodePointer 18780->18777 18781 2c6330b 18781->18780 18782 2c63330 18781->18782 19096 2c68adb 18781->19096 18782->18777 18784 2c68adb __realloc_crt 62 API calls 18782->18784 18785 2c6334a RtlEncodePointer 18782->18785 18786 2c63344 18784->18786 18785->18780 18786->18777 18786->18785 19123 2c6857b 18787->19123 18791 2c688f1 RtlEnterCriticalSection 18790->18791 18792 2c688de 18790->18792 18791->18775 18797 2c68955 18792->18797 18794 2c688e4 18794->18791 18819 2c6841f 18794->18819 18798 2c68961 __getstream 18797->18798 18811 2c68980 18798->18811 18826 2c686b3 18798->18826 18804 2c68976 18870 2c682fc 18804->18870 18805 2c6899e 18878 2c65e3b 18805->18878 18806 2c689ad 18810 2c688cd __lock 59 API calls 18806->18810 18807 2c689a3 __getstream 18807->18794 18812 2c689b4 18810->18812 18811->18807 18873 2c68a94 18811->18873 18813 2c689c1 18812->18813 18814 2c689d9 18812->18814 18881 2c691ec 18813->18881 18884 2c62f54 18814->18884 18817 2c689cd 18890 2c689f5 18817->18890 18820 2c686b3 __FF_MSGBANNER 59 API calls 18819->18820 18821 2c68427 18820->18821 18822 2c68710 __NMSG_WRITE 59 API calls 18821->18822 18823 2c6842f 18822->18823 19059 2c684ce 18823->19059 18893 2c7015e 18826->18893 18828 2c686ba 18829 2c686c7 18828->18829 18830 2c7015e __FF_MSGBANNER 59 API calls 18828->18830 18831 2c68710 __NMSG_WRITE 59 API calls 18829->18831 18833 2c686e9 18829->18833 18830->18829 18832 2c686df 18831->18832 18834 2c68710 __NMSG_WRITE 59 API calls 18832->18834 18835 2c68710 18833->18835 18834->18833 18836 2c6872e __NMSG_WRITE 18835->18836 18837 2c68855 18836->18837 18839 2c7015e __FF_MSGBANNER 55 API calls 18836->18839 18967 2c6452b 18837->18967 18841 2c68741 18839->18841 18840 2c688be 18840->18804 18842 2c6885a GetStdHandle 18841->18842 18843 2c7015e __FF_MSGBANNER 55 API calls 18841->18843 18842->18837 18846 2c68868 _strlen 18842->18846 18844 2c68752 18843->18844 18844->18842 18845 2c68764 18844->18845 18845->18837 18915 2c6f51d 18845->18915 18846->18837 18849 2c688a1 WriteFile 18846->18849 18849->18837 18850 2c688c2 18853 2c64ee5 __invoke_watson 8 API calls 18850->18853 18851 2c68791 GetModuleFileNameW 18852 2c687b1 18851->18852 18858 2c687c1 __NMSG_WRITE 18851->18858 18854 2c6f51d __NMSG_WRITE 55 API calls 18852->18854 18855 2c688cc 18853->18855 18854->18858 18856 2c688f1 RtlEnterCriticalSection 18855->18856 18859 2c68955 __mtinitlocknum 55 API calls 18855->18859 18856->18804 18857 2c68807 18857->18850 18933 2c6f4b1 18857->18933 18858->18850 18858->18857 18924 2c6f592 18858->18924 18861 2c688e4 18859->18861 18861->18856 18865 2c6841f __amsg_exit 55 API calls 18861->18865 18864 2c6f4b1 __NMSG_WRITE 55 API calls 18866 2c6883e 18864->18866 18867 2c688f0 18865->18867 18866->18850 18868 2c68845 18866->18868 18867->18856 18942 2c7019e RtlEncodePointer 18868->18942 18982 2c682c8 GetModuleHandleExW 18870->18982 18876 2c68aa2 18873->18876 18875 2c68997 18875->18805 18875->18806 18876->18875 18985 2c62f8c 18876->18985 19002 2c694e5 Sleep 18876->19002 19005 2c65c52 GetLastError 18878->19005 18880 2c65e40 18880->18807 18882 2c691fc 18881->18882 18883 2c69209 InitializeCriticalSectionAndSpinCount 18881->18883 18882->18817 18883->18817 18885 2c62f5d HeapFree 18884->18885 18886 2c62f86 _free 18884->18886 18885->18886 18887 2c62f72 18885->18887 18886->18817 18888 2c65e3b __commit 57 API calls 18887->18888 18889 2c62f78 GetLastError 18888->18889 18889->18886 19058 2c68a37 RtlLeaveCriticalSection 18890->19058 18892 2c689fc 18892->18807 18894 2c70168 18893->18894 18895 2c70172 18894->18895 18896 2c65e3b __commit 59 API calls 18894->18896 18895->18828 18897 2c7018e 18896->18897 18900 2c64ed5 18897->18900 18903 2c64eaa RtlDecodePointer 18900->18903 18904 2c64ebd 18903->18904 18909 2c64ee5 IsProcessorFeaturePresent 18904->18909 18907 2c64eaa __commit 8 API calls 18908 2c64ee1 18907->18908 18908->18828 18910 2c64ef0 18909->18910 18911 2c64d78 __call_reportfault 7 API calls 18910->18911 18912 2c64f05 18911->18912 18913 2c694f3 ___raise_securityfailure GetCurrentProcess TerminateProcess 18912->18913 18914 2c64ed4 18913->18914 18914->18907 18916 2c6f536 18915->18916 18917 2c6f528 18915->18917 18918 2c65e3b __commit 59 API calls 18916->18918 18917->18916 18922 2c6f54f 18917->18922 18919 2c6f540 18918->18919 18920 2c64ed5 __commit 9 API calls 18919->18920 18921 2c68784 18920->18921 18921->18850 18921->18851 18922->18921 18923 2c65e3b __commit 59 API calls 18922->18923 18923->18919 18927 2c6f5a0 18924->18927 18925 2c6f5a4 18926 2c65e3b __commit 59 API calls 18925->18926 18928 2c6f5a9 18925->18928 18932 2c6f5d4 18926->18932 18927->18925 18927->18928 18929 2c6f5e3 18927->18929 18928->18857 18929->18928 18931 2c65e3b __commit 59 API calls 18929->18931 18930 2c64ed5 __commit 9 API calls 18930->18928 18931->18932 18932->18930 18934 2c6f4cb 18933->18934 18935 2c6f4bd 18933->18935 18936 2c65e3b __commit 59 API calls 18934->18936 18935->18934 18939 2c6f4f7 18935->18939 18941 2c6f4d5 18936->18941 18937 2c64ed5 __commit 9 API calls 18938 2c68827 18937->18938 18938->18850 18938->18864 18939->18938 18940 2c65e3b __commit 59 API calls 18939->18940 18940->18941 18941->18937 18943 2c701d2 ___crtIsPackagedApp 18942->18943 18944 2c70291 IsDebuggerPresent 18943->18944 18945 2c701e1 LoadLibraryExW 18943->18945 18946 2c702b6 18944->18946 18947 2c7029b 18944->18947 18948 2c7021e GetProcAddress 18945->18948 18949 2c701f8 GetLastError 18945->18949 18951 2c702a9 18946->18951 18952 2c702bb RtlDecodePointer 18946->18952 18950 2c702a2 OutputDebugStringW 18947->18950 18947->18951 18954 2c70232 7 API calls 18948->18954 18955 2c702ae 18948->18955 18953 2c70207 LoadLibraryExW 18949->18953 18949->18955 18950->18951 18951->18955 18961 2c702e2 RtlDecodePointer RtlDecodePointer 18951->18961 18965 2c702fa 18951->18965 18952->18955 18953->18948 18953->18955 18956 2c7028e 18954->18956 18957 2c7027a GetProcAddress RtlEncodePointer 18954->18957 18958 2c6452b __atodbl_l 6 API calls 18955->18958 18956->18944 18957->18956 18963 2c70380 18958->18963 18959 2c7031e RtlDecodePointer 18959->18955 18960 2c70332 RtlDecodePointer 18960->18959 18964 2c70339 18960->18964 18961->18965 18963->18837 18964->18959 18966 2c7034a RtlDecodePointer 18964->18966 18965->18959 18965->18960 18966->18959 18968 2c64535 IsProcessorFeaturePresent 18967->18968 18969 2c64533 18967->18969 18971 2c6956f 18968->18971 18969->18840 18974 2c6951e IsDebuggerPresent 18971->18974 18975 2c69533 ___raise_securityfailure 18974->18975 18980 2c69508 SetUnhandledExceptionFilter UnhandledExceptionFilter 18975->18980 18977 2c6953b ___raise_securityfailure 18981 2c694f3 GetCurrentProcess TerminateProcess 18977->18981 18979 2c69558 18979->18840 18980->18977 18981->18979 18983 2c682e1 GetProcAddress 18982->18983 18984 2c682f3 ExitProcess 18982->18984 18983->18984 18986 2c63007 18985->18986 18994 2c62f98 18985->18994 18987 2c681e3 __calloc_impl RtlDecodePointer 18986->18987 18988 2c6300d 18987->18988 18989 2c65e3b __commit 58 API calls 18988->18989 19001 2c62fff 18989->19001 18990 2c686b3 __FF_MSGBANNER 58 API calls 18993 2c62fa3 18990->18993 18991 2c62fcb RtlAllocateHeap 18991->18994 18991->19001 18992 2c68710 __NMSG_WRITE 58 API calls 18992->18993 18993->18990 18993->18992 18993->18994 18996 2c682fc _doexit 3 API calls 18993->18996 18994->18991 18994->18993 18995 2c62ff3 18994->18995 18999 2c62ff1 18994->18999 19003 2c681e3 RtlDecodePointer 18994->19003 18998 2c65e3b __commit 58 API calls 18995->18998 18996->18993 18998->18999 19000 2c65e3b __commit 58 API calls 18999->19000 19000->19001 19001->18876 19002->18876 19004 2c681f6 19003->19004 19004->18994 19019 2c691ab 19005->19019 19007 2c65c67 19008 2c65cb5 SetLastError 19007->19008 19022 2c68a4c 19007->19022 19008->18880 19012 2c65c8e 19013 2c65c94 19012->19013 19014 2c65cac 19012->19014 19031 2c65cc1 19013->19031 19015 2c62f54 _free 56 API calls 19014->19015 19017 2c65cb2 19015->19017 19017->19008 19018 2c65c9c GetCurrentThreadId 19018->19008 19020 2c691c2 TlsGetValue 19019->19020 19021 2c691be 19019->19021 19020->19007 19021->19007 19023 2c68a53 19022->19023 19025 2c65c7a 19023->19025 19027 2c68a71 19023->19027 19041 2c70498 19023->19041 19025->19008 19028 2c691ca 19025->19028 19027->19023 19027->19025 19049 2c694e5 Sleep 19027->19049 19029 2c691e4 TlsSetValue 19028->19029 19030 2c691e0 19028->19030 19029->19012 19030->19012 19032 2c65ccd __getstream 19031->19032 19033 2c688cd __lock 59 API calls 19032->19033 19034 2c65d0a 19033->19034 19050 2c65d62 19034->19050 19037 2c688cd __lock 59 API calls 19038 2c65d2b ___addlocaleref 19037->19038 19053 2c65d6b 19038->19053 19040 2c65d56 __getstream 19040->19018 19042 2c704a3 19041->19042 19047 2c704be 19041->19047 19043 2c704af 19042->19043 19042->19047 19044 2c65e3b __commit 58 API calls 19043->19044 19046 2c704b4 19044->19046 19045 2c704ce RtlAllocateHeap 19045->19046 19045->19047 19046->19023 19047->19045 19047->19046 19048 2c681e3 __calloc_impl RtlDecodePointer 19047->19048 19048->19047 19049->19027 19056 2c68a37 RtlLeaveCriticalSection 19050->19056 19052 2c65d24 19052->19037 19057 2c68a37 RtlLeaveCriticalSection 19053->19057 19055 2c65d72 19055->19040 19056->19052 19057->19055 19058->18892 19062 2c68584 19059->19062 19061 2c6843a 19063 2c68590 __getstream 19062->19063 19064 2c688cd __lock 52 API calls 19063->19064 19065 2c68597 19064->19065 19066 2c68650 __cinit 19065->19066 19067 2c685c5 RtlDecodePointer 19065->19067 19082 2c6869e 19066->19082 19067->19066 19069 2c685dc RtlDecodePointer 19067->19069 19075 2c685ec 19069->19075 19071 2c686ad __getstream 19071->19061 19073 2c685f9 RtlEncodePointer 19073->19075 19074 2c68695 19076 2c682fc _doexit 3 API calls 19074->19076 19078 2c6869e 19074->19078 19075->19066 19075->19073 19077 2c68609 RtlDecodePointer RtlEncodePointer 19075->19077 19076->19078 19081 2c6861b RtlDecodePointer RtlDecodePointer 19077->19081 19079 2c686ab 19078->19079 19087 2c68a37 RtlLeaveCriticalSection 19078->19087 19079->19061 19081->19075 19083 2c686a4 19082->19083 19084 2c6867e 19082->19084 19088 2c68a37 RtlLeaveCriticalSection 19083->19088 19084->19071 19086 2c68a37 RtlLeaveCriticalSection 19084->19086 19086->19074 19087->19079 19088->19084 19090 2c69146 19089->19090 19091 2c6915b RtlSizeHeap 19089->19091 19092 2c65e3b __commit 59 API calls 19090->19092 19091->18781 19093 2c6914b 19092->19093 19094 2c64ed5 __commit 9 API calls 19093->19094 19095 2c69156 19094->19095 19095->18781 19100 2c68ae2 19096->19100 19098 2c68b1f 19098->18782 19100->19098 19101 2c70384 19100->19101 19122 2c694e5 Sleep 19100->19122 19102 2c7038d 19101->19102 19103 2c70398 19101->19103 19104 2c62f8c _malloc 59 API calls 19102->19104 19105 2c703a0 19103->19105 19112 2c703ad 19103->19112 19106 2c70395 19104->19106 19107 2c62f54 _free 59 API calls 19105->19107 19106->19100 19109 2c703a8 _free 19107->19109 19108 2c703e5 19110 2c681e3 __calloc_impl RtlDecodePointer 19108->19110 19109->19100 19113 2c703eb 19110->19113 19111 2c703b5 RtlReAllocateHeap 19111->19109 19111->19112 19112->19108 19112->19111 19115 2c70415 19112->19115 19116 2c681e3 __calloc_impl RtlDecodePointer 19112->19116 19119 2c703fd 19112->19119 19114 2c65e3b __commit 59 API calls 19113->19114 19114->19109 19117 2c65e3b __commit 59 API calls 19115->19117 19116->19112 19118 2c7041a GetLastError 19117->19118 19118->19109 19120 2c65e3b __commit 59 API calls 19119->19120 19121 2c70402 GetLastError 19120->19121 19121->19109 19122->19100 19126 2c68a37 RtlLeaveCriticalSection 19123->19126 19125 2c632cb 19125->18772 19126->19125 19390 2c63cef 19391 2c63cfd 19390->19391 19392 2c63cf8 19390->19392 19396 2c63d12 19391->19396 19404 2c6b8c1 19392->19404 19395 2c63d0b 19397 2c63d1e __getstream 19396->19397 19400 2c63d6c ___DllMainCRTStartup 19397->19400 19403 2c63dc9 __getstream 19397->19403 19408 2c63b7d 19397->19408 19399 2c63da6 19401 2c63b7d __CRT_INIT@12 138 API calls 19399->19401 19399->19403 19400->19399 19402 2c63b7d __CRT_INIT@12 138 API calls 19400->19402 19400->19403 19401->19403 19402->19399 19403->19395 19405 2c6b8e4 19404->19405 19406 2c6b8f1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 19404->19406 19405->19406 19407 2c6b8e8 19405->19407 19406->19407 19407->19391 19409 2c63b89 __getstream 19408->19409 19410 2c63b91 19409->19410 19411 2c63c0b 19409->19411 19456 2c681c6 GetProcessHeap 19410->19456 19413 2c63c74 19411->19413 19414 2c63c0f 19411->19414 19416 2c63cd7 19413->19416 19417 2c63c79 19413->19417 19419 2c63c30 19414->19419 19449 2c63b9a __CRT_INIT@12 __getstream 19414->19449 19557 2c6843b 19414->19557 19415 2c63b96 19415->19449 19457 2c65d74 19415->19457 19416->19449 19588 2c65c04 19416->19588 19418 2c691ab __CRT_INIT@12 TlsGetValue 19417->19418 19423 2c63c84 19418->19423 19560 2c68312 RtlDecodePointer 19419->19560 19427 2c68a4c __calloc_crt 59 API calls 19423->19427 19423->19449 19426 2c63ba6 __RTC_Initialize 19433 2c63bb6 GetCommandLineA 19426->19433 19426->19449 19429 2c63c95 19427->19429 19428 2c63c46 __CRT_INIT@12 19584 2c63c5f 19428->19584 19434 2c691ca __CRT_INIT@12 TlsSetValue 19429->19434 19429->19449 19430 2c6b55f __ioterm 60 API calls 19432 2c63c41 19430->19432 19435 2c65dea __mtterm 62 API calls 19432->19435 19478 2c6b95d GetEnvironmentStringsW 19433->19478 19437 2c63cad 19434->19437 19435->19428 19439 2c63cb3 19437->19439 19440 2c63ccb 19437->19440 19442 2c65cc1 __initptd 59 API calls 19439->19442 19443 2c62f54 _free 59 API calls 19440->19443 19445 2c63cbb GetCurrentThreadId 19442->19445 19443->19449 19444 2c63bd0 19446 2c63bd4 19444->19446 19510 2c6b5b1 19444->19510 19445->19449 19543 2c65dea 19446->19543 19449->19400 19451 2c63bf4 19451->19449 19552 2c6b55f 19451->19552 19456->19415 19596 2c684e2 RtlEncodePointer 19457->19596 19459 2c65d79 19601 2c689fe 19459->19601 19462 2c65d82 19464 2c65dea __mtterm 62 API calls 19462->19464 19465 2c65d87 19464->19465 19465->19426 19467 2c65d9f 19468 2c68a4c __calloc_crt 59 API calls 19467->19468 19469 2c65dac 19468->19469 19470 2c65de1 19469->19470 19471 2c691ca __CRT_INIT@12 TlsSetValue 19469->19471 19472 2c65dea __mtterm 62 API calls 19470->19472 19473 2c65dc0 19471->19473 19474 2c65de6 19472->19474 19473->19470 19475 2c65dc6 19473->19475 19474->19426 19476 2c65cc1 __initptd 59 API calls 19475->19476 19477 2c65dce GetCurrentThreadId 19476->19477 19477->19426 19479 2c63bc6 19478->19479 19480 2c6b970 WideCharToMultiByte 19478->19480 19491 2c6b2ab 19479->19491 19482 2c6b9a3 19480->19482 19483 2c6b9da FreeEnvironmentStringsW 19480->19483 19484 2c68a94 __malloc_crt 59 API calls 19482->19484 19483->19479 19485 2c6b9a9 19484->19485 19485->19483 19486 2c6b9b0 WideCharToMultiByte 19485->19486 19487 2c6b9c6 19486->19487 19488 2c6b9cf FreeEnvironmentStringsW 19486->19488 19489 2c62f54 _free 59 API calls 19487->19489 19488->19479 19490 2c6b9cc 19489->19490 19490->19488 19492 2c6b2b7 __getstream 19491->19492 19493 2c688cd __lock 59 API calls 19492->19493 19494 2c6b2be 19493->19494 19495 2c68a4c __calloc_crt 59 API calls 19494->19495 19497 2c6b2cf 19495->19497 19496 2c6b33a GetStartupInfoW 19504 2c6b34f 19496->19504 19507 2c6b47e 19496->19507 19497->19496 19498 2c6b2da @_EH4_CallFilterFunc@8 __getstream 19497->19498 19498->19444 19499 2c6b546 19609 2c6b556 19499->19609 19501 2c68a4c __calloc_crt 59 API calls 19501->19504 19502 2c6b4cb GetStdHandle 19502->19507 19503 2c6b4de GetFileType 19503->19507 19504->19501 19506 2c6b39d 19504->19506 19504->19507 19505 2c6b3d1 GetFileType 19505->19506 19506->19505 19506->19507 19508 2c691ec __getstream InitializeCriticalSectionAndSpinCount 19506->19508 19507->19499 19507->19502 19507->19503 19509 2c691ec __getstream InitializeCriticalSectionAndSpinCount 19507->19509 19508->19506 19509->19507 19511 2c6b5c4 GetModuleFileNameA 19510->19511 19512 2c6b5bf 19510->19512 19513 2c6b5f1 19511->19513 19619 2c6526a 19512->19619 19613 2c6b664 19513->19613 19517 2c68a94 __malloc_crt 59 API calls 19518 2c6b62a 19517->19518 19519 2c6b664 _parse_cmdline 59 API calls 19518->19519 19520 2c63be0 19518->19520 19519->19520 19520->19451 19521 2c6b7e0 19520->19521 19522 2c6b7e9 19521->19522 19525 2c6b7ee _strlen 19521->19525 19523 2c6526a ___initmbctable 71 API calls 19522->19523 19523->19525 19524 2c68a4c __calloc_crt 59 API calls 19526 2c6b824 _strlen 19524->19526 19525->19524 19528 2c63be9 19525->19528 19526->19528 19529 2c6b876 19526->19529 19530 2c68a4c __calloc_crt 59 API calls 19526->19530 19531 2c6b89d 19526->19531 19534 2c6b8b4 19526->19534 19823 2c66c9c 19526->19823 19527 2c62f54 _free 59 API calls 19527->19528 19528->19451 19537 2c6844a 19528->19537 19529->19527 19530->19526 19532 2c62f54 _free 59 API calls 19531->19532 19532->19528 19535 2c64ee5 __invoke_watson 8 API calls 19534->19535 19536 2c6b8c0 19535->19536 19539 2c68456 __IsNonwritableInCurrentImage 19537->19539 19832 2c6d2bf 19539->19832 19540 2c68474 __initterm_e 19541 2c63384 __cinit 68 API calls 19540->19541 19542 2c68493 __cinit __IsNonwritableInCurrentImage 19540->19542 19541->19542 19542->19451 19544 2c65df4 19543->19544 19546 2c65dfa 19543->19546 19835 2c6918c 19544->19835 19547 2c68917 RtlDeleteCriticalSection 19546->19547 19548 2c68933 19546->19548 19549 2c62f54 _free 59 API calls 19547->19549 19550 2c68952 19548->19550 19551 2c6893f RtlDeleteCriticalSection 19548->19551 19549->19546 19550->19449 19551->19548 19556 2c6b566 19552->19556 19553 2c6b5ae 19553->19446 19554 2c62f54 _free 59 API calls 19554->19556 19555 2c6b57f RtlDeleteCriticalSection 19555->19556 19556->19553 19556->19554 19556->19555 19558 2c68584 _doexit 59 API calls 19557->19558 19559 2c68446 19558->19559 19559->19419 19561 2c6833e 19560->19561 19562 2c6832c 19560->19562 19563 2c62f54 _free 59 API calls 19561->19563 19562->19561 19565 2c62f54 _free 59 API calls 19562->19565 19564 2c6834b 19563->19564 19566 2c6836f 19564->19566 19568 2c62f54 _free 59 API calls 19564->19568 19565->19562 19567 2c62f54 _free 59 API calls 19566->19567 19569 2c6837b 19567->19569 19568->19564 19570 2c62f54 _free 59 API calls 19569->19570 19571 2c6838c 19570->19571 19572 2c62f54 _free 59 API calls 19571->19572 19573 2c68397 19572->19573 19574 2c683bc RtlEncodePointer 19573->19574 19577 2c62f54 _free 59 API calls 19573->19577 19575 2c683d1 19574->19575 19576 2c683d7 19574->19576 19578 2c62f54 _free 59 API calls 19575->19578 19579 2c683ed 19576->19579 19581 2c62f54 _free 59 API calls 19576->19581 19580 2c683bb 19577->19580 19578->19576 19582 2c63c35 19579->19582 19583 2c62f54 _free 59 API calls 19579->19583 19580->19574 19581->19579 19582->19428 19582->19430 19583->19582 19585 2c63c63 19584->19585 19586 2c63c71 19584->19586 19585->19586 19587 2c65dea __mtterm 62 API calls 19585->19587 19586->19449 19587->19586 19589 2c65c11 19588->19589 19595 2c65c37 19588->19595 19590 2c65c1f 19589->19590 19591 2c691ab __CRT_INIT@12 TlsGetValue 19589->19591 19592 2c691ca __CRT_INIT@12 TlsSetValue 19590->19592 19591->19590 19593 2c65c2f 19592->19593 19838 2c65acf 19593->19838 19595->19449 19597 2c684f3 __init_pointers __initp_misc_winsig 19596->19597 19608 2c639e7 RtlEncodePointer 19597->19608 19599 2c6850b __init_pointers 19600 2c6925a 34 API calls 19599->19600 19600->19459 19602 2c68a0a 19601->19602 19603 2c691ec __getstream InitializeCriticalSectionAndSpinCount 19602->19603 19604 2c65d7e 19602->19604 19603->19602 19604->19462 19605 2c6916e 19604->19605 19606 2c69185 TlsAlloc 19605->19606 19607 2c65d94 19605->19607 19607->19462 19607->19467 19608->19599 19612 2c68a37 RtlLeaveCriticalSection 19609->19612 19611 2c6b55d 19611->19498 19612->19611 19615 2c6b686 19613->19615 19617 2c6b6ea 19615->19617 19623 2c715b6 19615->19623 19616 2c6b607 19616->19517 19616->19520 19617->19616 19618 2c715b6 _parse_cmdline 59 API calls 19617->19618 19618->19617 19620 2c6527a 19619->19620 19621 2c65273 19619->19621 19620->19511 19711 2c655c7 19621->19711 19626 2c7155c 19623->19626 19629 2c6225b 19626->19629 19630 2c6226c 19629->19630 19636 2c622b9 19629->19636 19637 2c65c3a 19630->19637 19633 2c62299 19633->19636 19657 2c65521 19633->19657 19636->19615 19638 2c65c52 __getptd_noexit 59 API calls 19637->19638 19639 2c65c40 19638->19639 19640 2c62272 19639->19640 19641 2c6841f __amsg_exit 59 API calls 19639->19641 19640->19633 19642 2c6519f 19640->19642 19641->19640 19643 2c651ab __getstream 19642->19643 19644 2c65c3a __setmbcp 59 API calls 19643->19644 19645 2c651b4 19644->19645 19646 2c651e3 19645->19646 19648 2c651c7 19645->19648 19647 2c688cd __lock 59 API calls 19646->19647 19649 2c651ea 19647->19649 19650 2c65c3a __setmbcp 59 API calls 19648->19650 19652 2c651cc 19650->19652 19658 2c6552d __getstream 19657->19658 19659 2c65c3a __setmbcp 59 API calls 19658->19659 19660 2c65537 19659->19660 19661 2c688cd __lock 59 API calls 19660->19661 19662 2c65549 19660->19662 19666 2c65567 19661->19666 19663 2c65557 __getstream 19662->19663 19665 2c6841f __amsg_exit 59 API calls 19662->19665 19663->19636 19665->19663 19712 2c655d3 __getstream 19711->19712 19713 2c65c3a __setmbcp 59 API calls 19712->19713 19714 2c655db 19713->19714 19715 2c65521 __setmbcp 59 API calls 19714->19715 19716 2c655e5 19715->19716 19736 2c652c2 19716->19736 19719 2c68a94 __malloc_crt 59 API calls 19720 2c65607 19719->19720 19721 2c65734 __getstream 19720->19721 19743 2c6576f 19720->19743 19721->19620 19737 2c6225b _LocaleUpdate::_LocaleUpdate 59 API calls 19736->19737 19738 2c652d2 19737->19738 19739 2c652f3 19738->19739 19740 2c652e1 GetOEMCP 19738->19740 19741 2c6530a 19739->19741 19742 2c652f8 GetACP 19739->19742 19740->19741 19741->19719 19741->19721 19742->19741 19744 2c652c2 getSystemCP 61 API calls 19743->19744 19745 2c6578c 19744->19745 19824 2c66cb5 19823->19824 19825 2c66ca7 19823->19825 19826 2c65e3b __commit 59 API calls 19824->19826 19825->19824 19830 2c66ccb 19825->19830 19827 2c66cbc 19826->19827 19828 2c64ed5 __commit 9 API calls 19827->19828 19829 2c66cc6 19828->19829 19829->19526 19830->19829 19831 2c65e3b __commit 59 API calls 19830->19831 19831->19827 19833 2c6d2c2 RtlEncodePointer 19832->19833 19833->19833 19834 2c6d2dc 19833->19834 19834->19540 19836 2c691a3 TlsFree 19835->19836 19837 2c6919f 19835->19837 19836->19546 19837->19546 19840 2c65adb __getstream 19838->19840 19839 2c65af4 19842 2c65b03 19839->19842 19844 2c62f54 _free 59 API calls 19839->19844 19840->19839 19841 2c62f54 _free 59 API calls 19840->19841 19843 2c65be3 __getstream 19840->19843 19841->19839 19845 2c65b12 19842->19845 19846 2c62f54 _free 59 API calls 19842->19846 19843->19595 19844->19842 19847 2c65b21 19845->19847 19849 2c62f54 _free 59 API calls 19845->19849 19846->19845 19848 2c65b30 19847->19848 19850 2c62f54 _free 59 API calls 19847->19850 19851 2c65b3f 19848->19851 19852 2c62f54 _free 59 API calls 19848->19852 19849->19847 19850->19848 19853 2c65b4e 19851->19853 19854 2c62f54 _free 59 API calls 19851->19854 19852->19851 19855 2c65b60 19853->19855 19857 2c62f54 _free 59 API calls 19853->19857 19854->19853 19856 2c688cd __lock 59 API calls 19855->19856 19860 2c65b68 19856->19860 19857->19855 19858 2c65b8b 19870 2c65bef 19858->19870 19860->19858 19862 2c62f54 _free 59 API calls 19860->19862 19862->19858 19863 2c688cd __lock 59 API calls 19868 2c65b9f ___removelocaleref 19863->19868 19864 2c65bd0 19873 2c65bfb 19864->19873 19867 2c62f54 _free 59 API calls 19867->19843 19868->19864 19869 2c64fa5 ___freetlocinfo 59 API calls 19868->19869 19869->19864 19876 2c68a37 RtlLeaveCriticalSection 19870->19876 19872 2c65b98 19872->19863 19877 2c68a37 RtlLeaveCriticalSection 19873->19877 19875 2c65bdd 19875->19867 19876->19872 19877->19875 19127 2c99483 19128 2cb2bcc Sleep 19127->19128 19130 40220b CreateDirectoryA 19131 40227e 19130->19131 19132 2c8e004 19135 2c5f879 CreateFileA 19132->19135 19136 2c5f975 19135->19136 19137 2c5f8aa 19135->19137 19138 2c5f8c2 DeviceIoControl 19137->19138 19139 2c5f96b CloseHandle 19137->19139 19140 2c5f937 GetLastError 19137->19140 19142 2c63b2c 19137->19142 19138->19137 19139->19136 19140->19137 19140->19139 19144 2c63b34 19142->19144 19143 2c62f8c _malloc 59 API calls 19143->19144 19144->19143 19145 2c63b4e 19144->19145 19146 2c681e3 __calloc_impl RtlDecodePointer 19144->19146 19147 2c63b52 std::exception::exception 19144->19147 19145->19137 19146->19144 19150 2c6453a 19147->19150 19149 2c63b7c 19151 2c64559 RaiseException 19150->19151 19151->19149 19153 40230d RegOpenKeyExA 19154 40231b 19153->19154 19154->19154 19878 40276d 19879 402774 RegQueryValueExA 19878->19879 19881 40d1b6 19879->19881 19882 40d456 RegCloseKey 19881->19882 19883 40d44f 19881->19883 19882->19883 19155 2c5648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19156 2c564f3 GetTickCount 19155->19156 19233 2c542c7 19155->19233 19234 2c5605a 19156->19234 19235 2c62f8c _malloc 59 API calls 19234->19235 19236 2c5606d 19235->19236 19884 2c572ab InternetOpenA 19885 2c572c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19884->19885 19903 2c566f4 _memset shared_ptr 19884->19903 19892 2c57342 _memset 19885->19892 19886 2c57322 InternetOpenUrlA 19887 2c57382 InternetCloseHandle 19886->19887 19886->19892 19887->19903 19888 2c5670e RtlEnterCriticalSection RtlLeaveCriticalSection 19888->19903 19889 2c56708 Sleep 19889->19888 19890 2c57346 InternetReadFile 19891 2c57377 InternetCloseHandle 19890->19891 19890->19892 19891->19887 19892->19886 19892->19890 19893 2c573e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19930 2c6231c 19893->19930 19895 2c62f8c _malloc 59 API calls 19896 2c5749d RtlEnterCriticalSection RtlLeaveCriticalSection 19895->19896 19896->19903 19897 2c5776a RtlEnterCriticalSection RtlLeaveCriticalSection 19897->19903 19898 2c6231c 66 API calls 19898->19903 19902 2c578e2 RtlEnterCriticalSection 19902->19903 19904 2c5790f RtlLeaveCriticalSection 19902->19904 19903->19884 19903->19888 19903->19889 19903->19893 19903->19895 19903->19897 19903->19898 19903->19902 19903->19904 19907 2c62f8c 59 API calls _malloc 19903->19907 19908 2c62f54 59 API calls _free 19903->19908 19911 2c635c6 60 API calls _strtok 19903->19911 19914 2c63b2c _Allocate 60 API calls 19903->19914 19919 2c5a6fb 73 API calls 19903->19919 19923 2c576e7 shared_ptr 19903->19923 19924 2c576ec Sleep 19903->19924 19927 2c561f5 19903->19927 19940 2c62830 19903->19940 19943 2c5970d 19903->19943 19950 2c5a825 19903->19950 19954 2c55119 19903->19954 19983 2c5abe5 19903->19983 19997 2c54100 19903->19997 20001 2c623f8 19903->20001 20012 2c51ba7 19903->20012 20027 2c53d7e 19903->20027 20034 2c58311 19903->20034 20040 2c5d0ed 19903->20040 20045 2c583c0 19903->20045 20053 2c533b2 19903->20053 20060 2c58fd9 19903->20060 20067 2c5534d 19903->20067 20020 2c53c67 19904->20020 19907->19903 19908->19903 19911->19903 19914->19903 19919->19903 19923->19924 19993 2c618d0 19924->19993 19928 2c62f8c _malloc 59 API calls 19927->19928 19929 2c56208 19928->19929 19931 2c62328 19930->19931 19936 2c6234b 19930->19936 19933 2c6232e 19931->19933 19931->19936 19935 2c65e3b __commit 59 API calls 19933->19935 19934 2c6235e 19934->19903 19937 2c62333 19935->19937 20077 2c62363 19936->20077 19938 2c64ed5 __commit 9 API calls 19937->19938 19939 2c6233e 19938->19939 19939->19903 20087 2c6284e 19940->20087 19942 2c62849 19942->19903 19944 2c59717 __EH_prolog 19943->19944 19945 2c51ba7 4 API calls 19944->19945 19946 2c5976c 19945->19946 19947 2c59789 RtlEnterCriticalSection 19946->19947 19948 2c597a4 19947->19948 19949 2c597a7 RtlLeaveCriticalSection 19947->19949 19948->19949 19949->19903 19951 2c5a82f __EH_prolog 19950->19951 20093 2c5dfd6 19951->20093 19953 2c5a84d shared_ptr 19953->19903 19955 2c55123 __EH_prolog 19954->19955 20097 2c60af0 19955->20097 19958 2c53c67 72 API calls 19959 2c5514a 19958->19959 19960 2c53d7e 64 API calls 19959->19960 19961 2c55158 19960->19961 19962 2c58311 89 API calls 19961->19962 19963 2c5516c 19962->19963 19965 2c55322 shared_ptr 19963->19965 20101 2c5a6fb 19963->20101 19965->19903 19967 2c551c4 19969 2c5a6fb 73 API calls 19967->19969 19968 2c551f6 19970 2c5a6fb 73 API calls 19968->19970 19971 2c551d4 19969->19971 19972 2c55207 19970->19972 19971->19965 19974 2c5a6fb 73 API calls 19971->19974 19972->19965 19973 2c5a6fb 73 API calls 19972->19973 19975 2c5524a 19973->19975 19976 2c552b4 19974->19976 19975->19965 19977 2c5a6fb 73 API calls 19975->19977 19976->19965 19978 2c5a6fb 73 API calls 19976->19978 19977->19971 19979 2c552da 19978->19979 19979->19965 19980 2c5a6fb 73 API calls 19979->19980 19981 2c55304 19980->19981 20106 2c5ceaf 19981->20106 19984 2c5abef __EH_prolog 19983->19984 20157 2c5d0c4 19984->20157 19986 2c5ac10 shared_ptr 20160 2c620d0 19986->20160 19988 2c5ac3d 19988->19903 19989 2c5ac27 19989->19988 20166 2c53fb0 19989->20166 19994 2c61901 19993->19994 19995 2c618dd 19993->19995 19994->19903 19995->19994 19996 2c618f1 GetProcessHeap HeapFree 19995->19996 19996->19994 19998 2c54112 19997->19998 19999 2c54118 19997->19999 20413 2c5a6d9 19998->20413 19999->19903 20002 2c62414 20001->20002 20003 2c62429 20001->20003 20004 2c65e3b __commit 59 API calls 20002->20004 20003->20002 20005 2c62430 20003->20005 20006 2c62419 20004->20006 20415 2c66030 20005->20415 20008 2c64ed5 __commit 9 API calls 20006->20008 20009 2c62424 20008->20009 20009->19903 20640 2c753d0 20012->20640 20014 2c51bb1 RtlEnterCriticalSection 20015 2c51be9 RtlLeaveCriticalSection 20014->20015 20016 2c51bd1 20014->20016 20017 2c51bfa RtlEnterCriticalSection 20015->20017 20016->20015 20018 2c51c55 RtlLeaveCriticalSection 20016->20018 20019 2c51c22 20017->20019 20018->19903 20019->20018 20021 2c60af0 Mailbox 68 API calls 20020->20021 20022 2c53c7e 20021->20022 20641 2c53ca2 20022->20641 20028 2c53d99 htons 20027->20028 20029 2c53dcb htons 20027->20029 20687 2c53bd3 20028->20687 20693 2c53c16 20029->20693 20032 2c53ded 20032->19903 20035 2c5834a 20034->20035 20036 2c58329 20034->20036 20039 2c5836f 20035->20039 20727 2c52ac7 20035->20727 20724 2c595d3 20036->20724 20039->19903 20041 2c60af0 Mailbox 68 API calls 20040->20041 20043 2c5d103 20041->20043 20042 2c5d1f1 20042->19903 20043->20042 20044 2c52db5 73 API calls 20043->20044 20044->20043 20046 2c583db WSASetLastError shutdown 20045->20046 20047 2c583cb 20045->20047 20049 2c5a4df 69 API calls 20046->20049 20048 2c60af0 Mailbox 68 API calls 20047->20048 20050 2c583d0 20048->20050 20051 2c583f8 20049->20051 20050->19903 20051->20050 20052 2c60af0 Mailbox 68 API calls 20051->20052 20052->20050 20054 2c533c4 InterlockedCompareExchange 20053->20054 20055 2c533e1 20053->20055 20054->20055 20056 2c533d6 20054->20056 20057 2c529ee 76 API calls 20055->20057 20821 2c532ab 20056->20821 20059 2c533f1 20057->20059 20059->19903 20061 2c58fe3 __EH_prolog 20060->20061 20869 2c5373f 20061->20869 20063 2c58ffd RtlEnterCriticalSection 20064 2c5900c RtlLeaveCriticalSection 20063->20064 20066 2c59046 20064->20066 20066->19903 20068 2c62f8c _malloc 59 API calls 20067->20068 20069 2c55362 SHGetSpecialFolderPathA 20068->20069 20070 2c55378 20069->20070 20878 2c63751 20070->20878 20074 2c553dc 20894 2c63a64 20074->20894 20076 2c553e2 20076->19903 20078 2c6225b _LocaleUpdate::_LocaleUpdate 59 API calls 20077->20078 20079 2c62377 20078->20079 20080 2c62385 20079->20080 20086 2c6239c 20079->20086 20081 2c65e3b __commit 59 API calls 20080->20081 20082 2c6238a 20081->20082 20083 2c64ed5 __commit 9 API calls 20082->20083 20085 2c62395 ___ascii_stricmp 20083->20085 20084 2c6595a 66 API calls __tolower_l 20084->20086 20085->19934 20086->20084 20086->20085 20088 2c6286b 20087->20088 20089 2c65e3b __commit 59 API calls 20088->20089 20092 2c6287b _strlen 20088->20092 20090 2c62870 20089->20090 20091 2c64ed5 __commit 9 API calls 20090->20091 20091->20092 20092->19942 20094 2c5dfe0 __EH_prolog 20093->20094 20095 2c63b2c _Allocate 60 API calls 20094->20095 20096 2c5dff7 20095->20096 20096->19953 20098 2c5513d 20097->20098 20099 2c60b19 20097->20099 20098->19958 20100 2c63384 __cinit 68 API calls 20099->20100 20100->20098 20102 2c60af0 Mailbox 68 API calls 20101->20102 20104 2c5a715 20102->20104 20103 2c5519d 20103->19965 20103->19967 20103->19968 20104->20103 20111 2c52db5 20104->20111 20107 2c60af0 Mailbox 68 API calls 20106->20107 20108 2c5cec9 20107->20108 20109 2c5cfd8 20108->20109 20138 2c52b95 20108->20138 20109->19965 20112 2c52de4 20111->20112 20113 2c52dca 20111->20113 20115 2c52dfc 20112->20115 20118 2c52def 20112->20118 20114 2c60af0 Mailbox 68 API calls 20113->20114 20117 2c52dcf 20114->20117 20125 2c52d39 WSASetLastError WSASend 20115->20125 20117->20104 20119 2c60af0 Mailbox 68 API calls 20118->20119 20119->20117 20120 2c52e54 WSASetLastError select 20135 2c5a4df 20120->20135 20121 2c52e0c 20121->20117 20121->20120 20123 2c60af0 68 API calls Mailbox 20121->20123 20124 2c52d39 71 API calls 20121->20124 20123->20121 20124->20121 20126 2c5a4df 69 API calls 20125->20126 20127 2c52d6e 20126->20127 20128 2c52d75 20127->20128 20129 2c52d82 20127->20129 20131 2c60af0 Mailbox 68 API calls 20128->20131 20130 2c52d7a 20129->20130 20132 2c60af0 Mailbox 68 API calls 20129->20132 20133 2c52d9c 20130->20133 20134 2c60af0 Mailbox 68 API calls 20130->20134 20131->20130 20132->20130 20133->20121 20134->20133 20136 2c60af0 Mailbox 68 API calls 20135->20136 20137 2c5a4eb WSAGetLastError 20136->20137 20137->20121 20139 2c52bc7 20138->20139 20140 2c52bb1 20138->20140 20144 2c52bd2 20139->20144 20152 2c52bdf 20139->20152 20141 2c60af0 Mailbox 68 API calls 20140->20141 20143 2c52bb6 20141->20143 20142 2c52be2 WSASetLastError WSARecv 20145 2c5a4df 69 API calls 20142->20145 20143->20108 20146 2c60af0 Mailbox 68 API calls 20144->20146 20145->20152 20146->20143 20147 2c60af0 68 API calls Mailbox 20147->20152 20148 2c52d22 20153 2c51996 20148->20153 20150 2c52cbc WSASetLastError select 20151 2c5a4df 69 API calls 20150->20151 20151->20152 20152->20142 20152->20143 20152->20147 20152->20148 20152->20150 20154 2c519bb 20153->20154 20155 2c5199f 20153->20155 20154->20143 20156 2c63384 __cinit 68 API calls 20155->20156 20156->20154 20179 2c5e256 20157->20179 20159 2c5d0d6 20159->19986 20261 2c63399 20160->20261 20162 2c620f4 20162->19989 20164 2c6211d ResumeThread 20164->19989 20165 2c62116 CloseHandle 20165->20164 20167 2c60af0 Mailbox 68 API calls 20166->20167 20168 2c53fb8 20167->20168 20331 2c51815 20168->20331 20171 2c5a661 20172 2c5a66b __EH_prolog 20171->20172 20337 2c5cc19 20172->20337 20180 2c5e260 __EH_prolog 20179->20180 20185 2c54030 20180->20185 20184 2c5e28e 20184->20159 20197 2c753d0 20185->20197 20187 2c5403a GetProcessHeap RtlAllocateHeap 20188 2c54053 std::exception::exception 20187->20188 20189 2c5407c 20187->20189 20198 2c5a6a0 20188->20198 20189->20184 20191 2c5408a 20189->20191 20192 2c54094 __EH_prolog 20191->20192 20242 2c5a2bf 20192->20242 20197->20187 20199 2c5a6aa __EH_prolog 20198->20199 20206 2c5cc4f 20199->20206 20204 2c6453a __CxxThrowException@8 RaiseException 20205 2c5a6d8 20204->20205 20212 2c5d7af 20206->20212 20209 2c5cc69 20234 2c5d7e7 20209->20234 20211 2c5a6c7 20211->20204 20215 2c624f3 20212->20215 20218 2c62521 20215->20218 20219 2c6252f 20218->20219 20220 2c5a6b9 20218->20220 20224 2c625b7 20219->20224 20220->20209 20225 2c625c0 20224->20225 20226 2c62534 20224->20226 20227 2c62f54 _free 59 API calls 20225->20227 20226->20220 20228 2c62579 20226->20228 20227->20226 20229 2c62585 _strlen 20228->20229 20230 2c625aa 20228->20230 20231 2c62f8c _malloc 59 API calls 20229->20231 20230->20220 20232 2c62597 20231->20232 20232->20230 20233 2c66c9c std::exception::_Copy_str 59 API calls 20232->20233 20233->20230 20235 2c5d7f1 __EH_prolog 20234->20235 20238 2c5b712 20235->20238 20237 2c5d828 Mailbox 20237->20211 20239 2c5b71c __EH_prolog 20238->20239 20240 2c624f3 std::exception::exception 59 API calls 20239->20240 20241 2c5b72d Mailbox 20240->20241 20241->20237 20253 2c5b0d6 20242->20253 20244 2c540c1 20245 2c53fdc 20244->20245 20260 2c753d0 20245->20260 20247 2c53fe6 CreateEventA 20248 2c53ffd 20247->20248 20249 2c5400f 20247->20249 20250 2c53fb0 Mailbox 68 API calls 20248->20250 20249->20184 20251 2c54005 20250->20251 20252 2c5a661 Mailbox 60 API calls 20251->20252 20252->20249 20254 2c5b0fe 20253->20254 20255 2c5b0e2 20253->20255 20254->20244 20256 2c63b2c _Allocate 60 API calls 20255->20256 20257 2c5b0f2 std::exception::exception 20255->20257 20256->20257 20257->20254 20258 2c6453a __CxxThrowException@8 RaiseException 20257->20258 20259 2c5fb07 20258->20259 20260->20247 20262 2c633a7 20261->20262 20263 2c633bb 20261->20263 20264 2c65e3b __commit 59 API calls 20262->20264 20265 2c68a4c __calloc_crt 59 API calls 20263->20265 20266 2c633ac 20264->20266 20267 2c633c8 20265->20267 20268 2c64ed5 __commit 9 API calls 20266->20268 20269 2c63419 20267->20269 20271 2c65c3a __setmbcp 59 API calls 20267->20271 20274 2c620eb 20268->20274 20270 2c62f54 _free 59 API calls 20269->20270 20272 2c6341f 20270->20272 20273 2c633d5 20271->20273 20272->20274 20280 2c65e1a 20272->20280 20275 2c65cc1 __initptd 59 API calls 20273->20275 20274->20162 20274->20164 20274->20165 20277 2c633de CreateThread 20275->20277 20277->20274 20279 2c63411 GetLastError 20277->20279 20288 2c634f9 20277->20288 20279->20269 20285 2c65e07 20280->20285 20282 2c65e23 _free 20283 2c65e3b __commit 59 API calls 20282->20283 20284 2c65e36 20283->20284 20284->20274 20286 2c65c52 __getptd_noexit 59 API calls 20285->20286 20287 2c65e0c 20286->20287 20287->20282 20289 2c63502 __threadstartex@4 20288->20289 20290 2c691ab __CRT_INIT@12 TlsGetValue 20289->20290 20291 2c63508 20290->20291 20292 2c6350f __threadstartex@4 20291->20292 20293 2c6353b 20291->20293 20295 2c691ca __CRT_INIT@12 TlsSetValue 20292->20295 20294 2c65acf __freefls@4 59 API calls 20293->20294 20297 2c63556 ___crtIsPackagedApp 20294->20297 20296 2c6351e 20295->20296 20299 2c63524 GetLastError RtlExitUserThread 20296->20299 20300 2c63531 GetCurrentThreadId 20296->20300 20298 2c6356a 20297->20298 20304 2c634a1 20297->20304 20310 2c63432 20298->20310 20299->20300 20300->20297 20305 2c634e3 RtlDecodePointer 20304->20305 20306 2c634aa LoadLibraryExW GetProcAddress 20304->20306 20309 2c634f3 20305->20309 20307 2c634cc 20306->20307 20308 2c634cd RtlEncodePointer 20306->20308 20307->20298 20308->20305 20309->20298 20311 2c6343e __getstream 20310->20311 20312 2c65c3a __setmbcp 59 API calls 20311->20312 20313 2c63443 20312->20313 20318 2c63473 20313->20318 20319 2c65c52 __getptd_noexit 59 API calls 20318->20319 20322 2c6347c 20319->20322 20320 2c63497 RtlExitUserThread 20321 2c63490 20324 2c65c04 __freeptd 59 API calls 20321->20324 20322->20320 20322->20321 20326 2c63576 20322->20326 20325 2c63496 20324->20325 20325->20320 20327 2c635b7 RtlDecodePointer 20326->20327 20328 2c6357f LoadLibraryExW GetProcAddress 20326->20328 20329 2c635c5 20327->20329 20328->20329 20330 2c635a1 RtlEncodePointer 20328->20330 20329->20321 20330->20327 20334 2c624b3 20331->20334 20335 2c62579 std::exception::_Copy_str 59 API calls 20334->20335 20336 2c5182a 20335->20336 20336->20171 20343 2c5d6e0 20337->20343 20340 2c5cc33 20405 2c5d718 20340->20405 20346 2c5b204 20343->20346 20347 2c5b20e __EH_prolog 20346->20347 20348 2c624f3 std::exception::exception 59 API calls 20347->20348 20349 2c5b21f 20348->20349 20352 2c57cd4 20349->20352 20355 2c588ce 20352->20355 20354 2c57cf3 20354->20340 20356 2c58957 20355->20356 20357 2c588e3 20355->20357 20384 2c5fb36 20356->20384 20358 2c58907 20357->20358 20359 2c588f0 20357->20359 20377 2c591f4 20358->20377 20367 2c59101 20359->20367 20366 2c58905 _memmove 20366->20354 20368 2c59125 20367->20368 20369 2c588f8 20367->20369 20370 2c5fb36 std::bad_exception::bad_exception 60 API calls 20368->20370 20372 2c59130 20369->20372 20371 2c5912f 20370->20371 20373 2c591a7 20372->20373 20374 2c59141 _memmove 20372->20374 20375 2c5fb36 std::bad_exception::bad_exception 60 API calls 20373->20375 20374->20366 20376 2c591b1 20375->20376 20378 2c59200 20377->20378 20379 2c5924c 20377->20379 20383 2c5920e std::bad_exception::bad_exception 20378->20383 20389 2c59aaf 20378->20389 20393 2c5fb08 20379->20393 20383->20366 20385 2c624b3 std::exception::exception 59 API calls 20384->20385 20386 2c5fb4e 20385->20386 20387 2c6453a __CxxThrowException@8 RaiseException 20386->20387 20388 2c5fb63 20387->20388 20390 2c59ab9 __EH_prolog 20389->20390 20398 2c5ac50 20390->20398 20392 2c59b10 _memmove std::bad_exception::bad_exception 20392->20383 20394 2c624b3 std::exception::exception 59 API calls 20393->20394 20395 2c5fb20 20394->20395 20396 2c6453a __CxxThrowException@8 RaiseException 20395->20396 20397 2c5fb35 20396->20397 20399 2c5ac73 20398->20399 20400 2c5ac5c 20398->20400 20399->20392 20401 2c63b2c _Allocate 60 API calls 20400->20401 20402 2c5ac67 std::exception::exception 20400->20402 20401->20402 20402->20399 20403 2c6453a __CxxThrowException@8 RaiseException 20402->20403 20404 2c5fb07 20403->20404 20406 2c5d722 __EH_prolog 20405->20406 20409 2c5b5fc 20406->20409 20410 2c5b606 __EH_prolog 20409->20410 20411 2c5b204 std::bad_exception::bad_exception 60 API calls 20410->20411 20412 2c5b617 Mailbox 20411->20412 20414 2c5a6e8 GetProcessHeap HeapFree 20413->20414 20414->19999 20416 2c6225b _LocaleUpdate::_LocaleUpdate 59 API calls 20415->20416 20417 2c660a5 20416->20417 20418 2c65e3b __commit 59 API calls 20417->20418 20419 2c660aa 20418->20419 20420 2c66b7b 20419->20420 20438 2c660ca __output_l __aulldvrm _strlen 20419->20438 20460 2c69e11 20419->20460 20421 2c65e3b __commit 59 API calls 20420->20421 20423 2c66b80 20421->20423 20424 2c64ed5 __commit 9 API calls 20423->20424 20425 2c66b55 20424->20425 20426 2c6452b __atodbl_l 6 API calls 20425->20426 20427 2c62456 20426->20427 20427->20009 20439 2c65ee1 20427->20439 20429 2c66bb0 79 API calls _write_string 20429->20438 20430 2c66733 RtlDecodePointer 20430->20438 20431 2c66bf8 79 API calls _write_multi_char 20431->20438 20432 2c62f54 _free 59 API calls 20432->20438 20433 2c6fac4 61 API calls __cftof 20433->20438 20434 2c68a94 __malloc_crt 59 API calls 20434->20438 20435 2c66796 RtlDecodePointer 20435->20438 20436 2c66c24 79 API calls _write_string 20436->20438 20437 2c667bb RtlDecodePointer 20437->20438 20438->20420 20438->20425 20438->20429 20438->20430 20438->20431 20438->20432 20438->20433 20438->20434 20438->20435 20438->20436 20438->20437 20467 2c6dcee 20438->20467 20440 2c69e11 __flush 59 API calls 20439->20440 20441 2c65eef 20440->20441 20442 2c65f11 20441->20442 20443 2c65efa 20441->20443 20445 2c65f16 20442->20445 20448 2c65f23 __flsbuf 20442->20448 20444 2c65e3b __commit 59 API calls 20443->20444 20447 2c65eff 20444->20447 20446 2c65e3b __commit 59 API calls 20445->20446 20446->20447 20447->20009 20448->20447 20456 2c65f72 20448->20456 20459 2c65f7d 20448->20459 20470 2c6f782 20448->20470 20449 2c65f87 20452 2c65fa1 20449->20452 20454 2c65fb8 20449->20454 20450 2c66001 20451 2c69e35 __write 79 API calls 20450->20451 20451->20447 20482 2c69e35 20452->20482 20454->20447 20510 2c6f7d6 20454->20510 20456->20459 20479 2c6f945 20456->20479 20459->20449 20459->20450 20461 2c69e30 20460->20461 20462 2c69e1b 20460->20462 20461->20438 20463 2c65e3b __commit 59 API calls 20462->20463 20464 2c69e20 20463->20464 20465 2c64ed5 __commit 9 API calls 20464->20465 20466 2c69e2b 20465->20466 20466->20438 20468 2c6225b _LocaleUpdate::_LocaleUpdate 59 API calls 20467->20468 20469 2c6dcff 20468->20469 20469->20438 20471 2c6f78d 20470->20471 20472 2c6f79a 20470->20472 20473 2c65e3b __commit 59 API calls 20471->20473 20475 2c6f7a6 20472->20475 20476 2c65e3b __commit 59 API calls 20472->20476 20474 2c6f792 20473->20474 20474->20456 20475->20456 20477 2c6f7c7 20476->20477 20478 2c64ed5 __commit 9 API calls 20477->20478 20478->20474 20480 2c68a94 __malloc_crt 59 API calls 20479->20480 20481 2c6f95a 20480->20481 20481->20459 20483 2c69e41 __getstream 20482->20483 20484 2c69e65 20483->20484 20485 2c69e4e 20483->20485 20486 2c69f04 20484->20486 20488 2c69e79 20484->20488 20487 2c65e07 __commit 59 API calls 20485->20487 20489 2c65e07 __commit 59 API calls 20486->20489 20490 2c69e53 20487->20490 20491 2c69e97 20488->20491 20492 2c69ea1 20488->20492 20493 2c69e9c 20489->20493 20494 2c65e3b __commit 59 API calls 20490->20494 20495 2c65e07 __commit 59 API calls 20491->20495 20535 2c70c67 20492->20535 20498 2c65e3b __commit 59 API calls 20493->20498 20502 2c69e5a __getstream 20494->20502 20495->20493 20497 2c69ea7 20499 2c69ecd 20497->20499 20500 2c69eba 20497->20500 20501 2c69f10 20498->20501 20505 2c65e3b __commit 59 API calls 20499->20505 20544 2c69f24 20500->20544 20504 2c64ed5 __commit 9 API calls 20501->20504 20502->20447 20504->20502 20507 2c69ed2 20505->20507 20506 2c69ec6 20603 2c69efc 20506->20603 20508 2c65e07 __commit 59 API calls 20507->20508 20508->20506 20511 2c6f7e2 __getstream 20510->20511 20512 2c6f7f3 20511->20512 20513 2c6f80b 20511->20513 20514 2c65e07 __commit 59 API calls 20512->20514 20515 2c6f8b0 20513->20515 20518 2c6f840 20513->20518 20517 2c6f7f8 20514->20517 20516 2c65e07 __commit 59 API calls 20515->20516 20519 2c6f8b5 20516->20519 20520 2c65e3b __commit 59 API calls 20517->20520 20521 2c70c67 ___lock_fhandle 60 API calls 20518->20521 20522 2c65e3b __commit 59 API calls 20519->20522 20523 2c6f800 __getstream 20520->20523 20524 2c6f846 20521->20524 20525 2c6f8bd 20522->20525 20523->20447 20526 2c6f874 20524->20526 20527 2c6f85c 20524->20527 20528 2c64ed5 __commit 9 API calls 20525->20528 20530 2c65e3b __commit 59 API calls 20526->20530 20529 2c6f8d2 __lseeki64_nolock 61 API calls 20527->20529 20528->20523 20531 2c6f86b 20529->20531 20532 2c6f879 20530->20532 20636 2c6f8a8 20531->20636 20533 2c65e07 __commit 59 API calls 20532->20533 20533->20531 20536 2c70c73 __getstream 20535->20536 20537 2c70cc2 RtlEnterCriticalSection 20536->20537 20538 2c688cd __lock 59 API calls 20536->20538 20539 2c70ce8 __getstream 20537->20539 20540 2c70c98 20538->20540 20539->20497 20541 2c70cb0 20540->20541 20542 2c691ec __getstream InitializeCriticalSectionAndSpinCount 20540->20542 20606 2c70cec 20541->20606 20542->20541 20545 2c69f31 __write_nolock 20544->20545 20546 2c69f70 20545->20546 20547 2c69f8f 20545->20547 20588 2c69f65 20545->20588 20549 2c65e07 __commit 59 API calls 20546->20549 20550 2c69fe7 20547->20550 20551 2c69fcb 20547->20551 20548 2c6452b __atodbl_l 6 API calls 20552 2c6a785 20548->20552 20553 2c69f75 20549->20553 20555 2c6a000 20550->20555 20610 2c6f8d2 20550->20610 20554 2c65e07 __commit 59 API calls 20551->20554 20552->20506 20556 2c65e3b __commit 59 API calls 20553->20556 20558 2c69fd0 20554->20558 20557 2c6f782 __read_nolock 59 API calls 20555->20557 20560 2c69f7c 20556->20560 20562 2c6a00e 20557->20562 20563 2c65e3b __commit 59 API calls 20558->20563 20561 2c64ed5 __commit 9 API calls 20560->20561 20561->20588 20564 2c6a367 20562->20564 20569 2c65c3a __setmbcp 59 API calls 20562->20569 20565 2c69fd7 20563->20565 20566 2c6a385 20564->20566 20567 2c6a6fa WriteFile 20564->20567 20568 2c64ed5 __commit 9 API calls 20565->20568 20570 2c6a39b 20566->20570 20571 2c6a4a9 20566->20571 20572 2c6a35a GetLastError 20567->20572 20581 2c6a327 20567->20581 20568->20588 20573 2c6a03a GetConsoleMode 20569->20573 20574 2c6a733 20570->20574 20578 2c6a40a WriteFile 20570->20578 20570->20581 20582 2c6a4b4 20571->20582 20591 2c6a59e 20571->20591 20572->20581 20573->20564 20576 2c6a079 20573->20576 20575 2c65e3b __commit 59 API calls 20574->20575 20574->20588 20579 2c6a761 20575->20579 20576->20564 20577 2c6a089 GetConsoleCP 20576->20577 20577->20574 20601 2c6a0b8 20577->20601 20578->20570 20578->20572 20584 2c65e07 __commit 59 API calls 20579->20584 20580 2c6a487 20585 2c6a492 20580->20585 20586 2c6a72a 20580->20586 20581->20574 20581->20580 20581->20588 20582->20574 20582->20581 20583 2c6a519 WriteFile 20582->20583 20583->20572 20583->20582 20584->20588 20589 2c65e3b __commit 59 API calls 20585->20589 20590 2c65e1a __dosmaperr 59 API calls 20586->20590 20587 2c6a613 WideCharToMultiByte 20587->20572 20587->20591 20588->20548 20593 2c6a497 20589->20593 20590->20588 20591->20574 20591->20581 20591->20587 20592 2c6a662 WriteFile 20591->20592 20592->20591 20595 2c6a6b5 GetLastError 20592->20595 20596 2c65e07 __commit 59 API calls 20593->20596 20595->20591 20596->20588 20597 2c71033 WriteConsoleW CreateFileW __putwch_nolock 20597->20601 20598 2c6ffea 61 API calls __write_nolock 20598->20601 20599 2c6a1a1 WideCharToMultiByte 20599->20581 20600 2c6a1dc WriteFile 20599->20600 20600->20572 20600->20601 20601->20572 20601->20581 20601->20597 20601->20598 20601->20599 20602 2c6a236 WriteFile 20601->20602 20619 2c6dd28 20601->20619 20602->20572 20602->20601 20635 2c7100d RtlLeaveCriticalSection 20603->20635 20605 2c69f02 20605->20502 20609 2c68a37 RtlLeaveCriticalSection 20606->20609 20608 2c70cf3 20608->20537 20609->20608 20622 2c70f24 20610->20622 20612 2c6f8e2 20613 2c6f8ea 20612->20613 20614 2c6f8fb SetFilePointerEx 20612->20614 20616 2c65e3b __commit 59 API calls 20613->20616 20615 2c6f913 GetLastError 20614->20615 20618 2c6f8ef 20614->20618 20617 2c65e1a __dosmaperr 59 API calls 20615->20617 20616->20618 20617->20618 20618->20555 20620 2c6dcee __isleadbyte_l 59 API calls 20619->20620 20621 2c6dd35 20620->20621 20621->20601 20623 2c70f2f 20622->20623 20624 2c70f44 20622->20624 20625 2c65e07 __commit 59 API calls 20623->20625 20626 2c65e07 __commit 59 API calls 20624->20626 20628 2c70f69 20624->20628 20627 2c70f34 20625->20627 20629 2c70f73 20626->20629 20630 2c65e3b __commit 59 API calls 20627->20630 20628->20612 20632 2c65e3b __commit 59 API calls 20629->20632 20631 2c70f3c 20630->20631 20631->20612 20633 2c70f7b 20632->20633 20634 2c64ed5 __commit 9 API calls 20633->20634 20634->20631 20635->20605 20639 2c7100d RtlLeaveCriticalSection 20636->20639 20638 2c6f8ae 20638->20523 20639->20638 20640->20014 20652 2c530ae WSASetLastError 20641->20652 20644 2c530ae 71 API calls 20645 2c53c90 20644->20645 20646 2c516ae 20645->20646 20647 2c516b8 __EH_prolog 20646->20647 20648 2c51701 20647->20648 20649 2c624b3 std::exception::exception 59 API calls 20647->20649 20648->19903 20650 2c516dc 20649->20650 20668 2c5a478 20650->20668 20653 2c530ec WSAStringToAddressA 20652->20653 20654 2c530ce 20652->20654 20656 2c5a4df 69 API calls 20653->20656 20654->20653 20655 2c530d3 20654->20655 20657 2c60af0 Mailbox 68 API calls 20655->20657 20658 2c53114 20656->20658 20667 2c530d8 20657->20667 20659 2c53154 20658->20659 20664 2c5311e _memcmp 20658->20664 20660 2c53135 20659->20660 20665 2c60af0 Mailbox 68 API calls 20659->20665 20661 2c53193 20660->20661 20662 2c60af0 Mailbox 68 API calls 20660->20662 20666 2c60af0 Mailbox 68 API calls 20661->20666 20661->20667 20662->20661 20663 2c60af0 Mailbox 68 API calls 20663->20660 20664->20660 20664->20663 20665->20660 20666->20667 20667->20644 20667->20645 20669 2c5a482 __EH_prolog 20668->20669 20676 2c5c9dd 20669->20676 20673 2c5a4a3 20674 2c6453a __CxxThrowException@8 RaiseException 20673->20674 20675 2c5a4b1 20674->20675 20677 2c5b204 std::bad_exception::bad_exception 60 API calls 20676->20677 20678 2c5a495 20677->20678 20679 2c5ca19 20678->20679 20680 2c5ca23 __EH_prolog 20679->20680 20683 2c5b1b3 20680->20683 20682 2c5ca52 Mailbox 20682->20673 20684 2c5b1bd __EH_prolog 20683->20684 20685 2c5b204 std::bad_exception::bad_exception 60 API calls 20684->20685 20686 2c5b1ce Mailbox 20685->20686 20686->20682 20688 2c53bdd __EH_prolog 20687->20688 20689 2c53bfe htonl htonl 20688->20689 20699 2c62497 20688->20699 20689->20032 20695 2c53c20 __EH_prolog 20693->20695 20694 2c53c41 20694->20032 20695->20694 20696 2c62497 std::bad_exception::bad_exception 59 API calls 20695->20696 20697 2c53c35 20696->20697 20698 2c5a62d 60 API calls 20697->20698 20698->20694 20700 2c624b3 std::exception::exception 59 API calls 20699->20700 20701 2c53bf2 20700->20701 20702 2c5a62d 20701->20702 20703 2c5a637 __EH_prolog 20702->20703 20710 2c5cb50 20703->20710 20707 2c5a652 20708 2c6453a __CxxThrowException@8 RaiseException 20707->20708 20709 2c5a660 20708->20709 20717 2c6247c 20710->20717 20713 2c5cb8c 20714 2c5cb96 __EH_prolog 20713->20714 20720 2c5b522 20714->20720 20716 2c5cbc5 Mailbox 20716->20707 20718 2c624f3 std::exception::exception 59 API calls 20717->20718 20719 2c5a644 20718->20719 20719->20713 20721 2c5b52c __EH_prolog 20720->20721 20722 2c6247c std::bad_exception::bad_exception 59 API calls 20721->20722 20723 2c5b53d Mailbox 20722->20723 20723->20716 20745 2c5353e 20724->20745 20728 2c52ae8 WSASetLastError connect 20727->20728 20729 2c52ad8 20727->20729 20730 2c5a4df 69 API calls 20728->20730 20731 2c60af0 Mailbox 68 API calls 20729->20731 20733 2c52b07 20730->20733 20732 2c52add 20731->20732 20735 2c60af0 Mailbox 68 API calls 20732->20735 20733->20732 20734 2c60af0 Mailbox 68 API calls 20733->20734 20734->20732 20737 2c52b1b 20735->20737 20736 2c52b38 20741 2c52b87 20736->20741 20805 2c53027 20736->20805 20737->20736 20739 2c60af0 Mailbox 68 API calls 20737->20739 20739->20736 20741->20039 20744 2c60af0 Mailbox 68 API calls 20744->20741 20746 2c53548 __EH_prolog 20745->20746 20747 2c53557 20746->20747 20748 2c53576 20746->20748 20749 2c51996 68 API calls 20747->20749 20767 2c52edd WSASetLastError WSASocketA 20748->20767 20765 2c5355f 20749->20765 20752 2c535ad CreateIoCompletionPort 20753 2c535c5 GetLastError 20752->20753 20754 2c535db 20752->20754 20755 2c60af0 Mailbox 68 API calls 20753->20755 20756 2c60af0 Mailbox 68 API calls 20754->20756 20757 2c535d2 20755->20757 20756->20757 20758 2c53626 20757->20758 20759 2c535ef 20757->20759 20793 2c5dec9 20758->20793 20760 2c60af0 Mailbox 68 API calls 20759->20760 20761 2c53608 20760->20761 20775 2c529ee 20761->20775 20764 2c53659 20766 2c60af0 Mailbox 68 API calls 20764->20766 20765->20035 20766->20765 20768 2c60af0 Mailbox 68 API calls 20767->20768 20769 2c52f0a WSAGetLastError 20768->20769 20770 2c52f21 20769->20770 20771 2c52f41 20769->20771 20772 2c52f27 setsockopt 20770->20772 20773 2c52f3c 20770->20773 20771->20752 20771->20765 20772->20773 20774 2c60af0 Mailbox 68 API calls 20773->20774 20774->20771 20776 2c52a0c 20775->20776 20792 2c52aad 20775->20792 20777 2c52a39 WSASetLastError closesocket 20776->20777 20780 2c60af0 Mailbox 68 API calls 20776->20780 20779 2c5a4df 69 API calls 20777->20779 20778 2c60af0 Mailbox 68 API calls 20781 2c52ab8 20778->20781 20783 2c52a51 20779->20783 20782 2c52a21 20780->20782 20781->20765 20797 2c52f50 20782->20797 20784 2c60af0 Mailbox 68 API calls 20783->20784 20783->20792 20786 2c52a5c 20784->20786 20788 2c52a7b ioctlsocket WSASetLastError closesocket 20786->20788 20789 2c60af0 Mailbox 68 API calls 20786->20789 20791 2c5a4df 69 API calls 20788->20791 20790 2c52a6e 20789->20790 20790->20788 20790->20792 20791->20792 20792->20778 20792->20781 20794 2c5ded3 __EH_prolog 20793->20794 20795 2c63b2c _Allocate 60 API calls 20794->20795 20796 2c5dee7 20795->20796 20796->20764 20798 2c52f70 WSASetLastError setsockopt 20797->20798 20799 2c52f5b 20797->20799 20800 2c5a4df 69 API calls 20798->20800 20801 2c60af0 Mailbox 68 API calls 20799->20801 20802 2c52f9e 20800->20802 20804 2c52a36 20801->20804 20803 2c60af0 Mailbox 68 API calls 20802->20803 20802->20804 20803->20804 20804->20777 20806 2c5304d WSASetLastError select 20805->20806 20807 2c5303b 20805->20807 20809 2c5a4df 69 API calls 20806->20809 20808 2c60af0 Mailbox 68 API calls 20807->20808 20811 2c52b59 20808->20811 20810 2c53095 20809->20810 20810->20811 20812 2c60af0 Mailbox 68 API calls 20810->20812 20811->20741 20813 2c52fb4 20811->20813 20812->20811 20814 2c52fd5 WSASetLastError getsockopt 20813->20814 20815 2c52fc0 20813->20815 20817 2c5a4df 69 API calls 20814->20817 20816 2c60af0 Mailbox 68 API calls 20815->20816 20820 2c52b7a 20816->20820 20818 2c5300f 20817->20818 20819 2c60af0 Mailbox 68 API calls 20818->20819 20818->20820 20819->20820 20820->20741 20820->20744 20828 2c753d0 20821->20828 20823 2c532b5 RtlEnterCriticalSection 20824 2c60af0 Mailbox 68 API calls 20823->20824 20825 2c532d6 20824->20825 20829 2c53307 20825->20829 20828->20823 20831 2c53311 __EH_prolog 20829->20831 20832 2c53350 20831->20832 20841 2c57e58 20831->20841 20845 2c5239d 20832->20845 20835 2c53390 20851 2c57e01 20835->20851 20837 2c60af0 Mailbox 68 API calls 20839 2c5337c 20837->20839 20840 2c52d39 71 API calls 20839->20840 20840->20835 20844 2c57e66 20841->20844 20842 2c57edc 20842->20831 20844->20842 20855 2c589bd 20844->20855 20849 2c523ab 20845->20849 20846 2c52417 20846->20835 20846->20837 20847 2c523c1 PostQueuedCompletionStatus 20848 2c523da RtlEnterCriticalSection 20847->20848 20847->20849 20848->20849 20849->20846 20849->20847 20850 2c523f8 InterlockedExchange RtlLeaveCriticalSection 20849->20850 20850->20849 20854 2c57e06 20851->20854 20852 2c532ee RtlLeaveCriticalSection 20852->20055 20854->20852 20866 2c51e7f 20854->20866 20856 2c589e7 20855->20856 20857 2c57e01 68 API calls 20856->20857 20858 2c58a2d 20857->20858 20859 2c58a54 20858->20859 20861 2c5a24a 20858->20861 20859->20842 20862 2c5a254 20861->20862 20863 2c5a264 20861->20863 20862->20863 20864 2c5fb08 std::bad_exception::bad_exception 60 API calls 20862->20864 20863->20859 20865 2c5a2be 20864->20865 20867 2c60af0 Mailbox 68 API calls 20866->20867 20868 2c51e90 20867->20868 20868->20854 20870 2c53755 InterlockedCompareExchange 20869->20870 20871 2c53770 20869->20871 20870->20871 20872 2c53765 20870->20872 20873 2c60af0 Mailbox 68 API calls 20871->20873 20874 2c532ab 78 API calls 20872->20874 20875 2c53779 20873->20875 20874->20871 20876 2c529ee 76 API calls 20875->20876 20877 2c5378e 20876->20877 20877->20063 20907 2c6368d 20878->20907 20880 2c553c8 20880->20076 20881 2c638e6 20880->20881 20882 2c638f2 __getstream 20881->20882 20883 2c63910 20882->20883 20884 2c63928 20882->20884 20893 2c63920 __getstream 20882->20893 20885 2c65e3b __commit 59 API calls 20883->20885 21049 2c697d2 20884->21049 20887 2c63915 20885->20887 20889 2c64ed5 __commit 9 API calls 20887->20889 20889->20893 20893->20074 20895 2c63a70 __getstream 20894->20895 20896 2c63a84 20895->20896 20897 2c63a9c 20895->20897 20898 2c65e3b __commit 59 API calls 20896->20898 20899 2c697d2 __lock_file 60 API calls 20897->20899 20906 2c63a94 __getstream 20897->20906 20900 2c63a89 20898->20900 20901 2c63aae 20899->20901 20902 2c64ed5 __commit 9 API calls 20900->20902 21076 2c639f8 20901->21076 20902->20906 20906->20076 20910 2c63699 __getstream 20907->20910 20908 2c636ab 20909 2c65e3b __commit 59 API calls 20908->20909 20911 2c636b0 20909->20911 20910->20908 20912 2c636d8 20910->20912 20913 2c64ed5 __commit 9 API calls 20911->20913 20926 2c698a8 20912->20926 20923 2c636bb @_EH4_CallFilterFunc@8 __getstream 20913->20923 20915 2c636dd 20916 2c636e6 20915->20916 20917 2c636f3 20915->20917 20918 2c65e3b __commit 59 API calls 20916->20918 20919 2c6371c 20917->20919 20920 2c636fc 20917->20920 20918->20923 20941 2c699c7 20919->20941 20921 2c65e3b __commit 59 API calls 20920->20921 20921->20923 20923->20880 20927 2c698b4 __getstream 20926->20927 20928 2c688cd __lock 59 API calls 20927->20928 20939 2c698c2 20928->20939 20929 2c69936 20971 2c699be 20929->20971 20930 2c6993d 20932 2c68a94 __malloc_crt 59 API calls 20930->20932 20934 2c69944 20932->20934 20933 2c699b3 __getstream 20933->20915 20934->20929 20935 2c691ec __getstream InitializeCriticalSectionAndSpinCount 20934->20935 20938 2c6996a RtlEnterCriticalSection 20935->20938 20936 2c68955 __mtinitlocknum 59 API calls 20936->20939 20938->20929 20939->20929 20939->20930 20939->20936 20961 2c69811 20939->20961 20966 2c6987b 20939->20966 20942 2c699e4 20941->20942 20943 2c699f8 20942->20943 20957 2c69b9f 20942->20957 20976 2c7082e 20942->20976 20944 2c65e3b __commit 59 API calls 20943->20944 20945 2c699fd 20944->20945 20946 2c64ed5 __commit 9 API calls 20945->20946 20948 2c63727 20946->20948 20947 2c69bfb 20982 2c70810 20947->20982 20958 2c63749 20948->20958 20954 2c7095d __openfile 59 API calls 20955 2c69bb7 20954->20955 20956 2c7095d __openfile 59 API calls 20955->20956 20955->20957 20956->20957 20957->20943 20957->20947 21042 2c69841 20958->21042 20960 2c6374f 20960->20923 20962 2c69832 RtlEnterCriticalSection 20961->20962 20963 2c6981c 20961->20963 20962->20939 20964 2c688cd __lock 59 API calls 20963->20964 20965 2c69825 20964->20965 20965->20939 20967 2c6989c RtlLeaveCriticalSection 20966->20967 20968 2c69889 20966->20968 20967->20939 20974 2c68a37 RtlLeaveCriticalSection 20968->20974 20970 2c69899 20970->20939 20975 2c68a37 RtlLeaveCriticalSection 20971->20975 20973 2c699c5 20973->20933 20974->20970 20975->20973 20985 2c70846 20976->20985 20978 2c69b65 20978->20943 20979 2c7095d 20978->20979 20993 2c70975 20979->20993 20981 2c69b98 20981->20954 20981->20957 21000 2c706f9 20982->21000 20984 2c70829 20984->20948 20986 2c7085b 20985->20986 20992 2c70854 20985->20992 20987 2c6225b _LocaleUpdate::_LocaleUpdate 59 API calls 20986->20987 20988 2c70868 20987->20988 20989 2c65e3b __commit 59 API calls 20988->20989 20988->20992 20990 2c7089b 20989->20990 20991 2c64ed5 __commit 9 API calls 20990->20991 20991->20992 20992->20978 20994 2c6225b _LocaleUpdate::_LocaleUpdate 59 API calls 20993->20994 20996 2c70988 20994->20996 20995 2c7099d 20995->20981 20996->20995 20997 2c65e3b __commit 59 API calls 20996->20997 20998 2c709c9 20997->20998 20999 2c64ed5 __commit 9 API calls 20998->20999 20999->20995 21003 2c70705 __getstream 21000->21003 21001 2c7071b 21002 2c65e3b __commit 59 API calls 21001->21002 21004 2c70720 21002->21004 21003->21001 21005 2c70751 21003->21005 21006 2c64ed5 __commit 9 API calls 21004->21006 21011 2c707c2 21005->21011 21008 2c7072a __getstream 21006->21008 21008->20984 21020 2c68216 21011->21020 21013 2c7076d 21016 2c70796 21013->21016 21014 2c707d6 21014->21013 21015 2c62f54 _free 59 API calls 21014->21015 21015->21013 21017 2c707c0 21016->21017 21018 2c7079c 21016->21018 21017->21008 21041 2c7100d RtlLeaveCriticalSection 21018->21041 21021 2c68223 21020->21021 21022 2c68239 21020->21022 21023 2c65e3b __commit 59 API calls 21021->21023 21022->21021 21024 2c68240 ___crtIsPackagedApp 21022->21024 21025 2c68228 21023->21025 21027 2c68256 MultiByteToWideChar 21024->21027 21028 2c68249 AreFileApisANSI 21024->21028 21026 2c64ed5 __commit 9 API calls 21025->21026 21034 2c68232 21026->21034 21030 2c68270 GetLastError 21027->21030 21031 2c68281 21027->21031 21028->21027 21029 2c68253 21028->21029 21029->21027 21032 2c65e1a __dosmaperr 59 API calls 21030->21032 21033 2c68a94 __malloc_crt 59 API calls 21031->21033 21032->21034 21035 2c68289 21033->21035 21034->21014 21035->21034 21036 2c68290 MultiByteToWideChar 21035->21036 21036->21034 21037 2c682a6 GetLastError 21036->21037 21038 2c65e1a __dosmaperr 59 API calls 21037->21038 21039 2c682b2 21038->21039 21040 2c62f54 _free 59 API calls 21039->21040 21040->21034 21041->21017 21043 2c69850 21042->21043 21044 2c6986f RtlLeaveCriticalSection 21042->21044 21043->21044 21045 2c69857 21043->21045 21044->20960 21048 2c68a37 RtlLeaveCriticalSection 21045->21048 21047 2c6986c 21047->20960 21048->21047 21050 2c69804 RtlEnterCriticalSection 21049->21050 21051 2c697e2 21049->21051 21052 2c6392e 21050->21052 21051->21050 21053 2c697ea 21051->21053 21055 2c6378d 21052->21055 21054 2c688cd __lock 59 API calls 21053->21054 21054->21052 21056 2c637ba 21055->21056 21059 2c6379c 21055->21059 21067 2c63960 21056->21067 21057 2c637aa 21058 2c65e3b __commit 59 API calls 21057->21058 21060 2c637af 21058->21060 21059->21056 21059->21057 21061 2c637d4 _memmove 21059->21061 21062 2c64ed5 __commit 9 API calls 21060->21062 21061->21056 21063 2c65ee1 __flsbuf 79 API calls 21061->21063 21065 2c69e11 __flush 59 API calls 21061->21065 21066 2c69e35 __write 79 API calls 21061->21066 21070 2c6a7cf 21061->21070 21062->21056 21063->21061 21065->21061 21066->21061 21068 2c69841 __fsopen 2 API calls 21067->21068 21069 2c63966 21068->21069 21069->20893 21071 2c6a806 21070->21071 21072 2c6a7e2 21070->21072 21071->21061 21072->21071 21073 2c69e11 __flush 59 API calls 21072->21073 21074 2c6a7ff 21073->21074 21075 2c69e35 __write 79 API calls 21074->21075 21075->21071 21077 2c63a07 21076->21077 21078 2c63a1b 21076->21078 21079 2c65e3b __commit 59 API calls 21077->21079 21081 2c6a7cf __flush 79 API calls 21078->21081 21084 2c63a17 21078->21084 21080 2c63a0c 21079->21080 21082 2c64ed5 __commit 9 API calls 21080->21082 21083 2c63a27 21081->21083 21082->21084 21095 2c6b27b 21083->21095 21092 2c63ad3 21084->21092 21087 2c69e11 __flush 59 API calls 21088 2c63a35 21087->21088 21099 2c6b106 21088->21099 21090 2c63a3b 21090->21084 21091 2c62f54 _free 59 API calls 21090->21091 21091->21084 21093 2c69841 __fsopen 2 API calls 21092->21093 21094 2c63ad9 21093->21094 21094->20906 21096 2c63a2f 21095->21096 21097 2c6b288 21095->21097 21096->21087 21097->21096 21098 2c62f54 _free 59 API calls 21097->21098 21098->21096 21100 2c6b112 __getstream 21099->21100 21101 2c6b136 21100->21101 21102 2c6b11f 21100->21102 21104 2c6b1c1 21101->21104 21106 2c6b146 21101->21106 21103 2c65e07 __commit 59 API calls 21102->21103 21105 2c6b124 21103->21105 21107 2c65e07 __commit 59 API calls 21104->21107 21108 2c65e3b __commit 59 API calls 21105->21108 21109 2c6b164 21106->21109 21110 2c6b16e 21106->21110 21111 2c6b169 21107->21111 21112 2c6b12b __getstream 21108->21112 21113 2c65e07 __commit 59 API calls 21109->21113 21114 2c70c67 ___lock_fhandle 60 API calls 21110->21114 21115 2c65e3b __commit 59 API calls 21111->21115 21112->21090 21113->21111 21116 2c6b174 21114->21116 21119 2c6b1cd 21115->21119 21117 2c6b187 21116->21117 21118 2c6b192 21116->21118 21125 2c6b1e1 21117->21125 21121 2c65e3b __commit 59 API calls 21118->21121 21122 2c64ed5 __commit 9 API calls 21119->21122 21123 2c6b18d 21121->21123 21122->21112 21140 2c6b1b9 21123->21140 21126 2c70f24 __commit 59 API calls 21125->21126 21127 2c6b1ef 21126->21127 21128 2c6b245 21127->21128 21130 2c6b223 21127->21130 21133 2c70f24 __commit 59 API calls 21127->21133 21143 2c70e9e 21128->21143 21130->21128 21131 2c70f24 __commit 59 API calls 21130->21131 21135 2c6b22f CloseHandle 21131->21135 21134 2c6b21a 21133->21134 21137 2c70f24 __commit 59 API calls 21134->21137 21135->21128 21138 2c6b23b GetLastError 21135->21138 21136 2c6b26f 21136->21123 21137->21130 21138->21128 21139 2c65e1a __dosmaperr 59 API calls 21139->21136 21152 2c7100d RtlLeaveCriticalSection 21140->21152 21142 2c6b1bf 21142->21112 21144 2c70f0a 21143->21144 21145 2c70eaa 21143->21145 21146 2c65e3b __commit 59 API calls 21144->21146 21145->21144 21151 2c70ed3 21145->21151 21147 2c70f0f 21146->21147 21148 2c65e07 __commit 59 API calls 21147->21148 21149 2c6b24d 21148->21149 21149->21136 21149->21139 21150 2c70ef5 SetStdHandle 21150->21149 21151->21149 21151->21150 21152->21142 21153 40222f 21157 4021e4 21153->21157 21154 40d026 GetLastError 21155 40d9d4 21154->21155 21156 40d31a 21157->21154 21157->21156 21158 402eb0 GetVersion 21182 403ff4 HeapCreate 21158->21182 21160 402f0f 21161 402f14 21160->21161 21162 402f1c 21160->21162 21257 402fcb 21161->21257 21194 403cd4 21162->21194 21165 402f24 GetCommandLineA 21208 403ba2 21165->21208 21170 402f3e 21240 40389c 21170->21240 21172 402f43 21173 402f48 GetStartupInfoA 21172->21173 21253 403844 21173->21253 21175 402f5a GetModuleHandleA 21177 402f7e 21175->21177 21263 4035eb 21177->21263 21183 404014 21182->21183 21184 40404a 21182->21184 21270 403eac 21183->21270 21184->21160 21187 404030 21190 40404d 21187->21190 21192 404c1c 5 API calls 21187->21192 21188 404023 21282 4043cb HeapAlloc 21188->21282 21190->21160 21191 40402d 21191->21190 21193 40403e HeapDestroy 21191->21193 21192->21191 21193->21184 21338 402fef 21194->21338 21197 403cf3 GetStartupInfoA 21205 403d3f 21197->21205 21206 403e04 21197->21206 21200 403e6b SetHandleCount 21200->21165 21201 403e2b GetStdHandle 21204 403e39 GetFileType 21201->21204 21201->21206 21202 403db0 21202->21206 21207 403dd2 GetFileType 21202->21207 21203 402fef 12 API calls 21203->21205 21204->21206 21205->21202 21205->21203 21205->21206 21206->21200 21206->21201 21207->21202 21209 403bf0 21208->21209 21210 403bbd GetEnvironmentStringsW 21208->21210 21211 403bc5 21209->21211 21212 403be1 21209->21212 21210->21211 21213 403bd1 GetEnvironmentStrings 21210->21213 21215 403c09 WideCharToMultiByte 21211->21215 21216 403bfd GetEnvironmentStringsW 21211->21216 21214 402f34 21212->21214 21217 403c83 GetEnvironmentStrings 21212->21217 21218 403c8f 21212->21218 21213->21212 21213->21214 21231 403955 21214->21231 21220 403c3d 21215->21220 21221 403c6f FreeEnvironmentStringsW 21215->21221 21216->21214 21216->21215 21217->21214 21217->21218 21222 402fef 12 API calls 21218->21222 21223 402fef 12 API calls 21220->21223 21221->21214 21229 403caa 21222->21229 21224 403c43 21223->21224 21224->21221 21225 403c4c WideCharToMultiByte 21224->21225 21227 403c66 21225->21227 21228 403c5d 21225->21228 21226 403cc0 FreeEnvironmentStringsA 21226->21214 21227->21221 21230 4030a1 7 API calls 21228->21230 21229->21226 21230->21227 21232 403967 21231->21232 21233 40396c GetModuleFileNameA 21231->21233 21367 4061b4 21232->21367 21234 40398f 21233->21234 21236 402fef 12 API calls 21234->21236 21237 4039b0 21236->21237 21238 4039c0 21237->21238 21239 402fa6 7 API calls 21237->21239 21238->21170 21239->21238 21241 4038a9 21240->21241 21243 4038ae 21240->21243 21242 4061b4 19 API calls 21241->21242 21242->21243 21244 402fef 12 API calls 21243->21244 21245 4038db 21244->21245 21246 402fa6 7 API calls 21245->21246 21252 4038ef 21245->21252 21246->21252 21247 403932 21248 4030a1 7 API calls 21247->21248 21249 40393e 21248->21249 21249->21172 21250 402fef 12 API calls 21250->21252 21251 402fa6 7 API calls 21251->21252 21252->21247 21252->21250 21252->21251 21254 40384d 21253->21254 21256 403852 21253->21256 21255 4061b4 19 API calls 21254->21255 21255->21256 21256->21175 21258 402fd4 21257->21258 21259 402fd9 21257->21259 21260 404224 7 API calls 21258->21260 21261 40425d 7 API calls 21259->21261 21260->21259 21262 402fe2 ExitProcess 21261->21262 21391 40360d 21263->21391 21266 4036c0 21267 4036cc 21266->21267 21268 4037f5 UnhandledExceptionFilter 21267->21268 21269 402f98 21267->21269 21268->21269 21284 402d40 21270->21284 21273 403ed5 21274 403eef GetEnvironmentVariableA 21273->21274 21275 403ee7 21273->21275 21277 403f0e 21274->21277 21281 403fcc 21274->21281 21275->21187 21275->21188 21278 403f53 GetModuleFileNameA 21277->21278 21279 403f4b 21277->21279 21278->21279 21279->21281 21286 4061d0 21279->21286 21281->21275 21289 403e7f GetModuleHandleA 21281->21289 21283 4043e7 21282->21283 21283->21191 21285 402d4c GetVersionExA 21284->21285 21285->21273 21285->21274 21291 4061e7 21286->21291 21290 403e96 21289->21290 21290->21275 21292 4061ff 21291->21292 21295 40622f 21292->21295 21298 4053a6 21292->21298 21294 4053a6 6 API calls 21294->21295 21295->21294 21297 4061e3 21295->21297 21302 4073ab 21295->21302 21297->21281 21299 4053c4 21298->21299 21300 4053b8 21298->21300 21308 40670e 21299->21308 21300->21292 21303 4073d6 21302->21303 21307 4073b9 21302->21307 21304 4073f2 21303->21304 21305 4053a6 6 API calls 21303->21305 21304->21307 21320 406857 21304->21320 21305->21304 21307->21295 21309 406757 21308->21309 21310 40673f GetStringTypeW 21308->21310 21312 406782 GetStringTypeA 21309->21312 21313 4067a6 21309->21313 21310->21309 21311 40675b GetStringTypeA 21310->21311 21311->21309 21315 406843 21311->21315 21312->21315 21313->21315 21316 4067bc MultiByteToWideChar 21313->21316 21315->21300 21316->21315 21317 4067e0 21316->21317 21317->21315 21318 40681a MultiByteToWideChar 21317->21318 21318->21315 21319 406833 GetStringTypeW 21318->21319 21319->21315 21321 406887 LCMapStringW 21320->21321 21322 4068a3 21320->21322 21321->21322 21323 4068ab LCMapStringA 21321->21323 21324 406909 21322->21324 21325 4068ec LCMapStringA 21322->21325 21323->21322 21332 4069e5 21323->21332 21326 40691f MultiByteToWideChar 21324->21326 21324->21332 21325->21332 21327 406949 21326->21327 21326->21332 21328 40697f MultiByteToWideChar 21327->21328 21327->21332 21329 406998 LCMapStringW 21328->21329 21328->21332 21330 4069b3 21329->21330 21329->21332 21331 4069b9 21330->21331 21334 4069f9 21330->21334 21331->21332 21333 4069c7 LCMapStringW 21331->21333 21332->21307 21333->21332 21334->21332 21335 406a31 LCMapStringW 21334->21335 21335->21332 21336 406a49 WideCharToMultiByte 21335->21336 21336->21332 21339 403001 12 API calls 21338->21339 21340 402ffe 21339->21340 21340->21197 21341 402fa6 21340->21341 21342 402fb4 21341->21342 21343 402faf 21341->21343 21353 40425d 21342->21353 21347 404224 21343->21347 21348 40422e 21347->21348 21349 40425b 21348->21349 21350 40425d 7 API calls 21348->21350 21349->21342 21351 404245 21350->21351 21352 40425d 7 API calls 21351->21352 21352->21349 21356 404270 21353->21356 21354 402fbd 21354->21197 21355 404387 21359 40439a GetStdHandle WriteFile 21355->21359 21356->21354 21356->21355 21357 4042b0 21356->21357 21357->21354 21358 4042bc GetModuleFileNameA 21357->21358 21360 4042d4 21358->21360 21359->21354 21362 406578 21360->21362 21363 406585 LoadLibraryA 21362->21363 21365 4065c7 21362->21365 21364 406596 GetProcAddress 21363->21364 21363->21365 21364->21365 21366 4065ad GetProcAddress GetProcAddress 21364->21366 21365->21354 21366->21365 21368 4061bd 21367->21368 21370 4061c4 21367->21370 21371 405df0 21368->21371 21370->21233 21378 405f89 21371->21378 21373 405f7d 21373->21370 21376 405e33 GetCPInfo 21377 405e47 21376->21377 21377->21373 21383 40602f GetCPInfo 21377->21383 21379 405fa9 21378->21379 21380 405f99 GetOEMCP 21378->21380 21381 405fae GetACP 21379->21381 21382 405e01 21379->21382 21380->21379 21381->21382 21382->21373 21382->21376 21382->21377 21387 406052 21383->21387 21390 40611a 21383->21390 21384 40670e 6 API calls 21385 4060ce 21384->21385 21386 406857 9 API calls 21385->21386 21388 4060f2 21386->21388 21387->21384 21389 406857 9 API calls 21388->21389 21389->21390 21390->21373 21392 403619 GetCurrentProcess TerminateProcess 21391->21392 21393 40362a 21391->21393 21392->21393 21394 402f87 21393->21394 21395 403694 ExitProcess 21393->21395 21394->21266 19237 4025d4 LoadLibraryExA 19238 40d169 19237->19238 19239 2c8e01e 19240 2c8e023 19239->19240 19244 2c5f97d LoadLibraryA 19240->19244 19241 2c98c16 19243 2c5f97d 64 API calls 19241->19243 19243->19241 19245 2c5f9a6 GetProcAddress 19244->19245 19246 2c5fa60 19244->19246 19247 2c5fa59 FreeLibrary 19245->19247 19248 2c5f9ba 19245->19248 19246->19241 19247->19246 19249 2c5f9cc GetAdaptersInfo 19248->19249 19250 2c5fa54 19248->19250 19251 2c63b2c _Allocate 60 API calls 19248->19251 19249->19248 19250->19247 19251->19248 19252 402858 OpenSCManagerA 19253 402199 lstrcmpiW 19254 402323 19253->19254 19255 40d761 lstrcmpiW 19254->19255 19256 402170 19254->19256 19255->19256 19257 40d9c9 19256->19257 19258 40d159 StartServiceCtrlDispatcherA 19256->19258 19258->19256 21396 4026ba 21397 4026bf VirtualAlloc 21396->21397 21399 40d8a7 21397->21399 19259 2cbf515 19260 2cc2987 ReadFile 19259->19260 19262 40d19e 19263 40d52a RegCreateKeyExA 19262->19263 19264 40d538 19263->19264 19265 40279f GetCommandLineW 19266 402895 CommandLineToArgvW 19265->19266 19267 40d9fe GetLocalTime 19266->19267 19270 401f27 19267->19270 19271 401f3c 19270->19271 19274 401a1d 19271->19274 19273 401f45 19275 401a2c 19274->19275 19280 401a4f CreateFileA 19275->19280 19279 401a3e 19279->19273 19281 401a35 19280->19281 19283 401a7d 19280->19283 19288 401b4b LoadLibraryA 19281->19288 19282 401a98 DeviceIoControl 19282->19283 19283->19282 19285 401b3a CloseHandle 19283->19285 19286 401b0e GetLastError 19283->19286 19297 402ca6 19283->19297 19300 402c98 19283->19300 19285->19281 19286->19283 19286->19285 19289 401c21 19288->19289 19290 401b6e GetProcAddress 19288->19290 19289->19279 19291 401c18 FreeLibrary 19290->19291 19296 401b85 19290->19296 19291->19289 19292 401b95 GetAdaptersInfo 19292->19296 19293 401c15 19293->19291 19294 402ca6 7 API calls 19294->19296 19295 402c98 12 API calls 19295->19296 19296->19292 19296->19293 19296->19294 19296->19295 19303 4030a1 19297->19303 19333 403001 19300->19333 19304 4030ad 19303->19304 19313 402caf 19303->19313 19305 4030b7 19304->19305 19306 4030cd 19304->19306 19308 4030f9 HeapFree 19305->19308 19309 4030c3 19305->19309 19307 4030f8 19306->19307 19311 4030e7 19306->19311 19307->19308 19308->19313 19314 40443e 19309->19314 19320 404ecf 19311->19320 19313->19283 19315 404732 19314->19315 19317 40447c 19314->19317 19315->19313 19316 404678 VirtualFree 19318 4046dc 19316->19318 19317->19315 19317->19316 19318->19315 19319 4046eb VirtualFree HeapFree 19318->19319 19319->19315 19321 404efc 19320->19321 19323 404f12 19320->19323 19321->19323 19324 404db6 19321->19324 19323->19313 19327 404dc3 19324->19327 19325 404e73 19325->19323 19326 404de4 VirtualFree 19326->19327 19327->19325 19327->19326 19329 404d60 VirtualFree 19327->19329 19330 404d7d 19329->19330 19331 404dad 19330->19331 19332 404d8d HeapFree 19330->19332 19331->19327 19332->19327 19334 402ca3 19333->19334 19336 403008 19333->19336 19334->19283 19336->19334 19337 40302d 19336->19337 19338 40303c 19337->19338 19344 403051 19337->19344 19340 40304a 19338->19340 19346 404767 19338->19346 19341 403090 HeapAlloc 19340->19341 19342 40309f 19340->19342 19343 40304f 19340->19343 19341->19342 19342->19336 19343->19336 19344->19340 19344->19341 19352 404f14 19344->19352 19348 404799 19346->19348 19347 404847 19347->19340 19348->19347 19351 404838 19348->19351 19359 404a70 19348->19359 19351->19347 19366 404b21 19351->19366 19353 404f22 19352->19353 19354 40500e VirtualAlloc 19353->19354 19355 4050e3 19353->19355 19358 404fdf 19353->19358 19354->19358 19370 404c1c 19355->19370 19358->19340 19360 404ab3 HeapAlloc 19359->19360 19361 404a83 HeapReAlloc 19359->19361 19363 404ad9 VirtualAlloc 19360->19363 19365 404b03 19360->19365 19362 404aa2 19361->19362 19361->19365 19362->19360 19364 404af3 HeapFree 19363->19364 19363->19365 19364->19365 19365->19351 19367 404b33 VirtualAlloc 19366->19367 19369 404b7c 19367->19369 19369->19347 19371 404c30 HeapAlloc 19370->19371 19372 404c29 19370->19372 19373 404c4d VirtualAlloc 19371->19373 19374 404c85 19371->19374 19372->19373 19375 404d42 19373->19375 19376 404c6d VirtualAlloc 19373->19376 19374->19358 19375->19374 19377 404d4a HeapFree 19375->19377 19376->19374 19378 404d34 VirtualFree 19376->19378 19377->19374 19378->19375

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 2c572ab-2c572c3 InternetOpenA 1 2c57389-2c5738f 0->1 2 2c572c9-2c5731d InternetSetOptionA * 3 call 2c64ad0 0->2 3 2c57391-2c57397 1->3 4 2c573ab-2c573b9 1->4 10 2c57322-2c57340 InternetOpenUrlA 2->10 6 2c5739d-2c573aa call 2c553ec 3->6 7 2c57399-2c5739b 3->7 8 2c566f4-2c566f6 4->8 9 2c573bf-2c573e3 call 2c64ad0 call 2c5439c 4->9 6->4 7->4 13 2c566ff-2c56701 8->13 14 2c566f8-2c566fd 8->14 9->8 33 2c573e9-2c57417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c6231c 9->33 15 2c57382-2c57383 InternetCloseHandle 10->15 16 2c57342 10->16 18 2c56703 13->18 19 2c5670e-2c56742 RtlEnterCriticalSection RtlLeaveCriticalSection 13->19 21 2c56708 Sleep 14->21 15->1 22 2c57346-2c5736c InternetReadFile 16->22 18->21 26 2c56744-2c56750 19->26 27 2c56792 19->27 21->19 24 2c57377-2c5737e InternetCloseHandle 22->24 25 2c5736e-2c57375 22->25 24->15 25->22 26->27 30 2c56752-2c5675f 26->30 29 2c56796 27->29 29->0 31 2c56767-2c56768 30->31 32 2c56761-2c56765 30->32 34 2c5676c-2c56790 call 2c64ad0 * 2 31->34 32->34 39 2c5746d-2c57488 call 2c6231c 33->39 40 2c57419-2c5742b call 2c6231c 33->40 34->29 48 2c57742-2c57754 call 2c6231c 39->48 49 2c5748e-2c57490 39->49 40->39 47 2c5742d-2c5743f call 2c6231c 40->47 47->39 59 2c57441-2c57453 call 2c6231c 47->59 56 2c57756-2c57758 48->56 57 2c5779d-2c577a6 call 2c6231c 48->57 49->48 52 2c57496-2c57548 call 2c62f8c RtlEnterCriticalSection RtlLeaveCriticalSection call 2c64ad0 * 5 call 2c5439c * 2 49->52 112 2c57585 52->112 113 2c5754a-2c5754c 52->113 56->57 60 2c5775a-2c57798 call 2c64ad0 RtlEnterCriticalSection RtlLeaveCriticalSection 56->60 66 2c577ab-2c577af 57->66 59->39 72 2c57455-2c57467 call 2c6231c 59->72 60->8 70 2c577b1-2c577bf call 2c561f5 call 2c56303 66->70 71 2c577d0-2c577e2 call 2c6231c 66->71 87 2c577c4-2c577cb call 2c5640e 70->87 81 2c57b00-2c57b12 call 2c6231c 71->81 82 2c577e8-2c577ea 71->82 72->8 72->39 81->8 93 2c57b18-2c57b46 call 2c62f8c call 2c64ad0 call 2c5439c 81->93 82->81 85 2c577f0-2c57807 call 2c5439c 82->85 85->8 98 2c5780d-2c578db call 2c623f8 call 2c51ba7 85->98 87->8 118 2c57b4f-2c57b56 call 2c62f54 93->118 119 2c57b48-2c57b4a call 2c5534d 93->119 115 2c578e2-2c57903 RtlEnterCriticalSection 98->115 116 2c578dd call 2c5143f 98->116 120 2c57589-2c575b7 call 2c62f8c call 2c64ad0 call 2c5439c 112->120 113->112 117 2c5754e-2c57560 call 2c6231c 113->117 122 2c57905-2c5790c 115->122 123 2c5790f-2c57973 RtlLeaveCriticalSection call 2c53c67 call 2c53d7e call 2c58311 115->123 116->115 117->112 134 2c57562-2c57583 call 2c5439c 117->134 118->8 119->118 146 2c575b9-2c575c8 call 2c635c6 120->146 147 2c575f8-2c57601 call 2c62f54 120->147 122->123 144 2c57ae7-2c57afb call 2c58fd9 123->144 145 2c57979-2c579c1 call 2c5a6fb 123->145 134->120 144->8 157 2c579c7-2c579ce 145->157 158 2c57ab1-2c57ae2 call 2c583c0 call 2c533b2 145->158 146->147 156 2c575ca 146->156 159 2c57607-2c5761f call 2c63b2c 147->159 160 2c57738-2c5773b 147->160 161 2c575cf-2c575e1 call 2c62830 156->161 163 2c579d1-2c579d6 157->163 158->144 169 2c57621-2c57629 call 2c5970d 159->169 170 2c5762b 159->170 160->48 176 2c575e6-2c575f6 call 2c635c6 161->176 177 2c575e3 161->177 163->163 167 2c579d8-2c57a23 call 2c5a6fb 163->167 167->158 182 2c57a29-2c57a2f 167->182 175 2c5762d-2c576e5 call 2c5a825 call 2c53863 call 2c55119 call 2c53863 call 2c5aacb call 2c5abe5 169->175 170->175 202 2c576e7 call 2c5380b 175->202 203 2c576ec-2c576fb Sleep 175->203 176->147 176->161 177->176 185 2c57a32-2c57a37 182->185 185->185 186 2c57a39-2c57a74 call 2c5a6fb 185->186 186->158 192 2c57a76-2c57ab0 call 2c5d0ed 186->192 192->158 202->203 205 2c57703-2c57717 call 2c618d0 203->205 207 2c57723-2c57731 205->207 208 2c57719-2c57722 call 2c54100 205->208 207->160 210 2c57733 call 2c5380b 207->210 208->207 210->160
                                                                  APIs
                                                                  • Sleep.KERNELBASE(0000EA60), ref: 02C56708
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C56713
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C56724
                                                                  • _memset.LIBCMT ref: 02C56779
                                                                  • _memset.LIBCMT ref: 02C56788
                                                                  • InternetOpenA.WININET(?), ref: 02C572B5
                                                                  • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02C572DD
                                                                  • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02C572F5
                                                                  • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02C5730D
                                                                  • _memset.LIBCMT ref: 02C5731D
                                                                  • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02C57336
                                                                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02C57358
                                                                  • InternetCloseHandle.WININET(00000000), ref: 02C57378
                                                                  • InternetCloseHandle.WININET(00000000), ref: 02C57383
                                                                  • _memset.LIBCMT ref: 02C573CB
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C573EE
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C573FF
                                                                  • _malloc.LIBCMT ref: 02C57498
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C574AA
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C574B6
                                                                  • _memset.LIBCMT ref: 02C574D0
                                                                  • _memset.LIBCMT ref: 02C574DF
                                                                  • _memset.LIBCMT ref: 02C574EF
                                                                  • _memset.LIBCMT ref: 02C57502
                                                                  • _memset.LIBCMT ref: 02C57518
                                                                  • _malloc.LIBCMT ref: 02C5758E
                                                                  • _memset.LIBCMT ref: 02C5759F
                                                                  • _strtok.LIBCMT ref: 02C575BF
                                                                  • _swscanf.LIBCMT ref: 02C575D6
                                                                  • _strtok.LIBCMT ref: 02C575ED
                                                                  • _free.LIBCMT ref: 02C575F9
                                                                  • Sleep.KERNEL32(000007D0), ref: 02C576F1
                                                                  • _memset.LIBCMT ref: 02C57765
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C57772
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C57784
                                                                  • _sprintf.LIBCMT ref: 02C57822
                                                                  • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C578E6
                                                                  • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C5791A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                  • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                  • API String ID: 696907137-1839899575
                                                                  • Opcode ID: d7f0ae7db8e4c39c3d060bcd6e92c58028e86f19595901562096c9ef853cf5ab
                                                                  • Instruction ID: fc374c7ec84dc5856b1ee06eaac56818558e8bb2c3e89a23d0e1e829a4ba01fe
                                                                  • Opcode Fuzzy Hash: d7f0ae7db8e4c39c3d060bcd6e92c58028e86f19595901562096c9ef853cf5ab
                                                                  • Instruction Fuzzy Hash: CA3224315483919FE334AB20DC44BABB7EAAFC5314F14092DF98997291EB70D588CB5B

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 213 2c5648b-2c564ec RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 214 2c564f3-2c566f1 GetTickCount call 2c5605a GetVersionExA call 2c64ad0 call 2c62f8c * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c64ad0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c62f8c * 4 QueryPerformanceCounter Sleep call 2c62f8c * 2 call 2c64ad0 * 2 213->214 215 2c564ee call 2c542c7 213->215 258 2c566f4-2c566f6 214->258 215->214 259 2c566ff-2c56701 258->259 260 2c566f8-2c566fd 258->260 261 2c56703 259->261 262 2c5670e-2c56742 RtlEnterCriticalSection RtlLeaveCriticalSection 259->262 263 2c56708 Sleep 260->263 261->263 264 2c56744-2c56750 262->264 265 2c56792 262->265 263->262 264->265 267 2c56752-2c5675f 264->267 266 2c56796-2c572c3 InternetOpenA 265->266 272 2c57389-2c5738f 266->272 273 2c572c9-2c57340 InternetSetOptionA * 3 call 2c64ad0 InternetOpenUrlA 266->273 268 2c56767-2c56768 267->268 269 2c56761-2c56765 267->269 271 2c5676c-2c56790 call 2c64ad0 * 2 268->271 269->271 271->266 274 2c57391-2c57397 272->274 275 2c573ab-2c573b9 272->275 286 2c57382-2c57383 InternetCloseHandle 273->286 287 2c57342 273->287 278 2c5739d-2c573aa call 2c553ec 274->278 279 2c57399-2c5739b 274->279 275->258 281 2c573bf-2c573e3 call 2c64ad0 call 2c5439c 275->281 278->275 279->275 281->258 296 2c573e9-2c57417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c6231c 281->296 286->272 291 2c57346-2c5736c InternetReadFile 287->291 293 2c57377-2c5737e InternetCloseHandle 291->293 294 2c5736e-2c57375 291->294 293->286 294->291 299 2c5746d-2c57488 call 2c6231c 296->299 300 2c57419-2c5742b call 2c6231c 296->300 306 2c57742-2c57754 call 2c6231c 299->306 307 2c5748e-2c57490 299->307 300->299 305 2c5742d-2c5743f call 2c6231c 300->305 305->299 317 2c57441-2c57453 call 2c6231c 305->317 314 2c57756-2c57758 306->314 315 2c5779d-2c577af call 2c6231c 306->315 307->306 310 2c57496-2c57548 call 2c62f8c RtlEnterCriticalSection RtlLeaveCriticalSection call 2c64ad0 * 5 call 2c5439c * 2 307->310 370 2c57585 310->370 371 2c5754a-2c5754c 310->371 314->315 318 2c5775a-2c57798 call 2c64ad0 RtlEnterCriticalSection RtlLeaveCriticalSection 314->318 328 2c577b1-2c577bf call 2c561f5 call 2c56303 315->328 329 2c577d0-2c577e2 call 2c6231c 315->329 317->299 330 2c57455-2c57467 call 2c6231c 317->330 318->258 345 2c577c4-2c577cb call 2c5640e 328->345 339 2c57b00-2c57b12 call 2c6231c 329->339 340 2c577e8-2c577ea 329->340 330->258 330->299 339->258 351 2c57b18-2c57b46 call 2c62f8c call 2c64ad0 call 2c5439c 339->351 340->339 343 2c577f0-2c57807 call 2c5439c 340->343 343->258 356 2c5780d-2c578db call 2c623f8 call 2c51ba7 343->356 345->258 376 2c57b4f-2c57b56 call 2c62f54 351->376 377 2c57b48-2c57b4a call 2c5534d 351->377 373 2c578e2-2c57903 RtlEnterCriticalSection 356->373 374 2c578dd call 2c5143f 356->374 378 2c57589-2c575b7 call 2c62f8c call 2c64ad0 call 2c5439c 370->378 371->370 375 2c5754e-2c57560 call 2c6231c 371->375 380 2c57905-2c5790c 373->380 381 2c5790f-2c57973 RtlLeaveCriticalSection call 2c53c67 call 2c53d7e call 2c58311 373->381 374->373 375->370 392 2c57562-2c57583 call 2c5439c 375->392 376->258 377->376 404 2c575b9-2c575c8 call 2c635c6 378->404 405 2c575f8-2c57601 call 2c62f54 378->405 380->381 402 2c57ae7-2c57afb call 2c58fd9 381->402 403 2c57979-2c579c1 call 2c5a6fb 381->403 392->378 402->258 415 2c579c7-2c579ce 403->415 416 2c57ab1-2c57ae2 call 2c583c0 call 2c533b2 403->416 404->405 414 2c575ca 404->414 417 2c57607-2c5761f call 2c63b2c 405->417 418 2c57738-2c5773b 405->418 419 2c575cf-2c575e1 call 2c62830 414->419 421 2c579d1-2c579d6 415->421 416->402 427 2c57621-2c57629 call 2c5970d 417->427 428 2c5762b 417->428 418->306 434 2c575e6-2c575f6 call 2c635c6 419->434 435 2c575e3 419->435 421->421 425 2c579d8-2c57a23 call 2c5a6fb 421->425 425->416 440 2c57a29-2c57a2f 425->440 433 2c5762d-2c576e5 call 2c5a825 call 2c53863 call 2c55119 call 2c53863 call 2c5aacb call 2c5abe5 427->433 428->433 460 2c576e7 call 2c5380b 433->460 461 2c576ec-2c57717 Sleep call 2c618d0 433->461 434->405 434->419 435->434 443 2c57a32-2c57a37 440->443 443->443 444 2c57a39-2c57a74 call 2c5a6fb 443->444 444->416 450 2c57a76-2c57ab0 call 2c5d0ed 444->450 450->416 460->461 465 2c57723-2c57731 461->465 466 2c57719-2c57722 call 2c54100 461->466 465->418 468 2c57733 call 2c5380b 465->468 466->465 468->418
                                                                  APIs
                                                                  • RtlInitializeCriticalSection.NTDLL(02C871E0), ref: 02C564BA
                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C564D1
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02C564DA
                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C564E9
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02C564EC
                                                                  • GetTickCount.KERNEL32 ref: 02C564F8
                                                                    • Part of subcall function 02C5605A: _malloc.LIBCMT ref: 02C56068
                                                                  • GetVersionExA.KERNEL32(02C87038), ref: 02C56525
                                                                  • _memset.LIBCMT ref: 02C56544
                                                                  • _malloc.LIBCMT ref: 02C56551
                                                                    • Part of subcall function 02C62F8C: __FF_MSGBANNER.LIBCMT ref: 02C62FA3
                                                                    • Part of subcall function 02C62F8C: __NMSG_WRITE.LIBCMT ref: 02C62FAA
                                                                    • Part of subcall function 02C62F8C: RtlAllocateHeap.NTDLL(00680000,00000000,00000001), ref: 02C62FCF
                                                                  • _malloc.LIBCMT ref: 02C56561
                                                                  • _malloc.LIBCMT ref: 02C5656C
                                                                  • _malloc.LIBCMT ref: 02C56577
                                                                  • _malloc.LIBCMT ref: 02C56582
                                                                  • _malloc.LIBCMT ref: 02C5658D
                                                                  • _malloc.LIBCMT ref: 02C56598
                                                                  • _malloc.LIBCMT ref: 02C565A7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C565BE
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02C565C7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C565D6
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02C565D9
                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C565E4
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02C565E7
                                                                  • _memset.LIBCMT ref: 02C565FA
                                                                  • _memset.LIBCMT ref: 02C56606
                                                                  • _memset.LIBCMT ref: 02C56613
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C56621
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C5662E
                                                                  • _malloc.LIBCMT ref: 02C56652
                                                                  • _malloc.LIBCMT ref: 02C56660
                                                                  • _malloc.LIBCMT ref: 02C56667
                                                                  • _malloc.LIBCMT ref: 02C5668D
                                                                  • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C566A0
                                                                  • Sleep.KERNELBASE ref: 02C566AE
                                                                  • _malloc.LIBCMT ref: 02C566BA
                                                                  • _malloc.LIBCMT ref: 02C566C7
                                                                  • _memset.LIBCMT ref: 02C566DC
                                                                  • _memset.LIBCMT ref: 02C566EC
                                                                  • Sleep.KERNELBASE(0000EA60), ref: 02C56708
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C56713
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C56724
                                                                  • _memset.LIBCMT ref: 02C56779
                                                                  • _memset.LIBCMT ref: 02C56788
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                  • API String ID: 2251652938-2678694477
                                                                  • Opcode ID: 69d785642b0dd562199989ae44901a6e2d380f748aca3ba6507a8fbac764dd81
                                                                  • Instruction ID: 9b3c9a478b33c95a81bbc1905ba420ced33ba5fa7f1f3e73f6cb1d6bdeda4eb7
                                                                  • Opcode Fuzzy Hash: 69d785642b0dd562199989ae44901a6e2d380f748aca3ba6507a8fbac764dd81
                                                                  • Instruction Fuzzy Hash: 4F71A2B1D48350AFE3206B309C89B6BBBE8EF45710F104929F98597281DBB99844DF96

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 744 401b4b-401b68 LoadLibraryA 745 401c21-401c25 744->745 746 401b6e-401b7f GetProcAddress 744->746 747 401b85-401b8e 746->747 748 401c18-401c1b FreeLibrary 746->748 749 401b95-401ba5 GetAdaptersInfo 747->749 748->745 750 401ba7-401bb0 749->750 751 401bdb-401be3 749->751 752 401bc1-401bd7 call 402cc0 call 4018cc 750->752 753 401bb2-401bb6 750->753 754 401be5-401beb call 402ca6 751->754 755 401bec-401bf0 751->755 752->751 753->751 758 401bb8-401bbf 753->758 754->755 756 401bf2-401bf6 755->756 757 401c15-401c17 755->757 756->757 761 401bf8-401bfb 756->761 757->748 758->752 758->753 764 401c06-401c13 call 402c98 761->764 765 401bfd-401c03 761->765 764->749 764->757 765->764
                                                                  APIs
                                                                  • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                  • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                  • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                  • API String ID: 514930453-3667123677
                                                                  • Opcode ID: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                                  • Instruction ID: 38440359ad4724572ca0372a4bc8090c683b298b5ffde01d95b1867a6a9b844d
                                                                  • Opcode Fuzzy Hash: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                                  • Instruction Fuzzy Hash: F921B870904109AFEF119F65C9447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 795 2c5f97d-2c5f9a0 LoadLibraryA 796 2c5f9a6-2c5f9b4 GetProcAddress 795->796 797 2c5fa60-2c5fa67 795->797 798 2c5fa59-2c5fa5a FreeLibrary 796->798 799 2c5f9ba-2c5f9ca 796->799 798->797 800 2c5f9cc-2c5f9d8 GetAdaptersInfo 799->800 801 2c5fa10-2c5fa18 800->801 802 2c5f9da 800->802 804 2c5fa21-2c5fa26 801->804 805 2c5fa1a-2c5fa20 call 2c63788 801->805 803 2c5f9dc-2c5f9e3 802->803 808 2c5f9e5-2c5f9e9 803->808 809 2c5f9ed-2c5f9f5 803->809 806 2c5fa54-2c5fa58 804->806 807 2c5fa28-2c5fa2b 804->807 805->804 806->798 807->806 812 2c5fa2d-2c5fa32 807->812 808->803 813 2c5f9eb 808->813 814 2c5f9f8-2c5f9fd 809->814 815 2c5fa34-2c5fa3c 812->815 816 2c5fa3f-2c5fa4a call 2c63b2c 812->816 813->801 814->814 817 2c5f9ff-2c5fa0c call 2c5f6cc 814->817 815->816 816->806 822 2c5fa4c-2c5fa4f 816->822 817->801 822->800
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02C5F993
                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C5F9AC
                                                                  • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C5F9D1
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 02C5FA5A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                  • API String ID: 514930453-3114217049
                                                                  • Opcode ID: 89862497a42279f6718455056c26ee2b7ab7c9ec41b8e8ff93d1262ebe51f68d
                                                                  • Instruction ID: 7848483bd22fc3de8e8923d8b3f783f6dc580320d21e63ecd6ecbcff59e4b9cd
                                                                  • Opcode Fuzzy Hash: 89862497a42279f6718455056c26ee2b7ab7c9ec41b8e8ff93d1262ebe51f68d
                                                                  • Instruction Fuzzy Hash: 9221EB71E40219ABDF15DB68D8846EEBBF89F46300F14416DED05E7611D730CA85CBA9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 851 2c5f879-2c5f8a4 CreateFileA 852 2c5f975-2c5f97c 851->852 853 2c5f8aa-2c5f8bf 851->853 854 2c5f8c2-2c5f8e4 DeviceIoControl 853->854 855 2c5f8e6-2c5f8ee 854->855 856 2c5f91d-2c5f925 854->856 859 2c5f8f7-2c5f8fc 855->859 860 2c5f8f0-2c5f8f5 855->860 857 2c5f927-2c5f92d call 2c63788 856->857 858 2c5f92e-2c5f930 856->858 857->858 862 2c5f932-2c5f935 858->862 863 2c5f96b-2c5f974 CloseHandle 858->863 859->856 864 2c5f8fe-2c5f906 859->864 860->856 867 2c5f937-2c5f940 GetLastError 862->867 868 2c5f951-2c5f95e call 2c63b2c 862->868 863->852 865 2c5f909-2c5f90e 864->865 865->865 869 2c5f910-2c5f91c call 2c5f6cc 865->869 867->863 870 2c5f942-2c5f945 867->870 868->863 875 2c5f960-2c5f966 868->875 869->856 870->868 873 2c5f947-2c5f94e 870->873 873->868 875->854
                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C5F898
                                                                  • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C5F8D6
                                                                  • GetLastError.KERNEL32 ref: 02C5F937
                                                                  • CloseHandle.KERNELBASE(?), ref: 02C5F96E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                  • String ID: \\.\PhysicalDrive0
                                                                  • API String ID: 4026078076-1180397377
                                                                  • Opcode ID: 088a673d7d859c8ae5607e4cbf86383995eb187402adcfd9435aa82064e40fe1
                                                                  • Instruction ID: 21e3e473c8830b77b452e6ad140336fed2d2badfc4d416376d64b9c2923494a5
                                                                  • Opcode Fuzzy Hash: 088a673d7d859c8ae5607e4cbf86383995eb187402adcfd9435aa82064e40fe1
                                                                  • Instruction Fuzzy Hash: A731F471E00629BBDB18DF95D884BAEBBB9FF46714F20416EE904A3640D7709B44CBD4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 877 401a4f-401a77 CreateFileA 878 401b45-401b4a 877->878 879 401a7d-401a91 877->879 880 401a98-401ac0 DeviceIoControl 879->880 881 401ac2-401aca 880->881 882 401af3-401afb 880->882 885 401ad4-401ad9 881->885 886 401acc-401ad2 881->886 883 401b04-401b07 882->883 884 401afd-401b03 call 402ca6 882->884 889 401b09-401b0c 883->889 890 401b3a-401b44 CloseHandle 883->890 884->883 885->882 887 401adb-401af1 call 402cc0 call 4018cc 885->887 886->882 887->882 893 401b27-401b34 call 402c98 889->893 894 401b0e-401b17 GetLastError 889->894 890->878 893->880 893->890 894->890 897 401b19-401b1c 894->897 897->893 900 401b1e-401b24 897->900 900->893
                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                  • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                  • GetLastError.KERNEL32 ref: 00401B0E
                                                                  • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                  • String ID: \\.\PhysicalDrive0
                                                                  • API String ID: 4026078076-1180397377
                                                                  • Opcode ID: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                                  • Instruction ID: fc4aaa1cf60edb7db06fdbd05dea25136cd7d186831ecbc7bbbcf924abbffa34
                                                                  • Opcode Fuzzy Hash: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                                  • Instruction Fuzzy Hash: 74318B71D00218EADB21AFA5CD849EFBBB9FF41750F20407AE554B32A0E7785E45CB98

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 902 402199-4021a1 lstrcmpiW 903 402323 902->903 904 402329-402890 call 402cc0 903->904 905 40d6bb-40d76a lstrcmpiW 903->905 913 4028a7-40d160 StartServiceCtrlDispatcherA 904->913 914 40d60d 904->914 908 40d9c3 905->908 911 40d9c9-40d9ca 908->911 912 40d32b-40d32e 908->912 916 40d613-40d61a 912->916 917 40217a 912->917 913->912 914->913 914->916 916->908 917->913
                                                                  APIs
                                                                  • lstrcmpiW.KERNELBASE ref: 00402199
                                                                  • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D15A
                                                                  • lstrcmpiW.KERNEL32(?,0040915C), ref: 0040D764
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcmpi$CtrlDispatcherServiceStart
                                                                  • String ID: test
                                                                  • API String ID: 2172614945-3632233996
                                                                  • Opcode ID: 5ae61f63a8e06413efbf1cbc6131c1c7aae20cf67e079e7d3b8cd5e39f076596
                                                                  • Instruction ID: e6d18fb5675363f103dcfed14c989fe5127fa8abfa2e43cfdb745462f06fff5f
                                                                  • Opcode Fuzzy Hash: 5ae61f63a8e06413efbf1cbc6131c1c7aae20cf67e079e7d3b8cd5e39f076596
                                                                  • Instruction Fuzzy Hash: 0FF068B4E08201EAEB106FB19E4C67E7754BB09301B30847BA447B11D1CB7C450E6A9F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 940 40d487-40d488 941 40d489 940->941 942 40d457-40d461 941->942 943 40d48b-40d48c 941->943 944 40d677 942->944 945 40d4fb-40d4ff 943->945 946 40d48e-40d498 943->946 951 40dad6 944->951 949 40d505 945->949 950 4028a7-40d160 StartServiceCtrlDispatcherA 945->950 947 40d4d0-40d4d7 946->947 948 40d49a-40d49f 946->948 947->945 952 40d520-40d525 948->952 953 40d4a1 948->953 955 40d51d 949->955 962 40d32b-40d32e 950->962 959 40dad7 951->959 952->951 956 40d4b0-40d4b4 953->956 957 40d4a3 953->957 955->952 956->941 961 40d4b6-40d4ca 956->961 957->955 960 40d4a5-40d4ad 957->960 959->959 960->956 961->947 964 40d613-40d9c3 962->964 965 40217a 962->965 964->962 967 40d9c9-40d9ca 964->967 965->950
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /chk
                                                                  • API String ID: 0-3837807730
                                                                  • Opcode ID: 29d1cf7ffd5baad62fb2cddb07dcb7a5a4ece1c976db70669faed20f2cdf337e
                                                                  • Instruction ID: 025942cb242d3d5260985c598898fe5e06497644a84d452e8f5b1ec8b5760f88
                                                                  • Opcode Fuzzy Hash: 29d1cf7ffd5baad62fb2cddb07dcb7a5a4ece1c976db70669faed20f2cdf337e
                                                                  • Instruction Fuzzy Hash: 8901DCB6C1C902E5E7114AD44D8A8BB2B6CE80A30C7244433D287BA4C3DA7C944F914E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 471 2c56391-2c563a1 472 2c563a3-2c563a8 471->472 473 2c56418-2c56425 471->473 472->473 474 2c5637b-2c56383 472->474 475 2c56427-2c5643f 473->475 476 2c5645e-2c5646d 473->476 479 2c56385 474->479 480 2c56347-2c56351 474->480 481 2c56443-2c5645c 475->481 477 2c564d7-2c566f1 GetModuleHandleA GetProcAddress call 2c542c7 GetTickCount call 2c5605a GetVersionExA call 2c64ad0 call 2c62f8c * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c64ad0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c62f8c * 4 QueryPerformanceCounter Sleep call 2c62f8c * 2 call 2c64ad0 * 2 476->477 478 2c5646f 476->478 531 2c566f4-2c566f6 477->531 478->481 482 2c56471-2c5648a 478->482 486 2c56387-2c56390 479->486 484 2c56353-2c5637a 480->484 485 2c562fb-2c56302 480->485 481->476 484->474 486->486 532 2c566ff-2c56701 531->532 533 2c566f8-2c566fd 531->533 534 2c56703 532->534 535 2c5670e-2c56742 RtlEnterCriticalSection RtlLeaveCriticalSection 532->535 536 2c56708 Sleep 533->536 534->536 537 2c56744-2c56750 535->537 538 2c56792 535->538 536->535 537->538 540 2c56752-2c5675f 537->540 539 2c56796-2c572c3 InternetOpenA 538->539 545 2c57389-2c5738f 539->545 546 2c572c9-2c57340 InternetSetOptionA * 3 call 2c64ad0 InternetOpenUrlA 539->546 541 2c56767-2c56768 540->541 542 2c56761-2c56765 540->542 544 2c5676c-2c56790 call 2c64ad0 * 2 541->544 542->544 544->539 547 2c57391-2c57397 545->547 548 2c573ab-2c573b9 545->548 559 2c57382-2c57383 InternetCloseHandle 546->559 560 2c57342 546->560 551 2c5739d-2c573aa call 2c553ec 547->551 552 2c57399-2c5739b 547->552 548->531 554 2c573bf-2c573e3 call 2c64ad0 call 2c5439c 548->554 551->548 552->548 554->531 569 2c573e9-2c57417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c6231c 554->569 559->545 564 2c57346-2c5736c InternetReadFile 560->564 566 2c57377-2c5737e InternetCloseHandle 564->566 567 2c5736e-2c57375 564->567 566->559 567->564 572 2c5746d-2c57488 call 2c6231c 569->572 573 2c57419-2c5742b call 2c6231c 569->573 579 2c57742-2c57754 call 2c6231c 572->579 580 2c5748e-2c57490 572->580 573->572 578 2c5742d-2c5743f call 2c6231c 573->578 578->572 590 2c57441-2c57453 call 2c6231c 578->590 587 2c57756-2c57758 579->587 588 2c5779d-2c577af call 2c6231c 579->588 580->579 583 2c57496-2c57548 call 2c62f8c RtlEnterCriticalSection RtlLeaveCriticalSection call 2c64ad0 * 5 call 2c5439c * 2 580->583 643 2c57585 583->643 644 2c5754a-2c5754c 583->644 587->588 591 2c5775a-2c57798 call 2c64ad0 RtlEnterCriticalSection RtlLeaveCriticalSection 587->591 601 2c577b1-2c577cb call 2c561f5 call 2c56303 call 2c5640e 588->601 602 2c577d0-2c577e2 call 2c6231c 588->602 590->572 603 2c57455-2c57467 call 2c6231c 590->603 591->531 601->531 612 2c57b00-2c57b12 call 2c6231c 602->612 613 2c577e8-2c577ea 602->613 603->531 603->572 612->531 624 2c57b18-2c57b46 call 2c62f8c call 2c64ad0 call 2c5439c 612->624 613->612 616 2c577f0-2c57807 call 2c5439c 613->616 616->531 629 2c5780d-2c578db call 2c623f8 call 2c51ba7 616->629 649 2c57b4f-2c57b56 call 2c62f54 624->649 650 2c57b48-2c57b4a call 2c5534d 624->650 646 2c578e2-2c57903 RtlEnterCriticalSection 629->646 647 2c578dd call 2c5143f 629->647 651 2c57589-2c575b7 call 2c62f8c call 2c64ad0 call 2c5439c 643->651 644->643 648 2c5754e-2c57560 call 2c6231c 644->648 653 2c57905-2c5790c 646->653 654 2c5790f-2c57973 RtlLeaveCriticalSection call 2c53c67 call 2c53d7e call 2c58311 646->654 647->646 648->643 665 2c57562-2c57583 call 2c5439c 648->665 649->531 650->649 677 2c575b9-2c575c8 call 2c635c6 651->677 678 2c575f8-2c57601 call 2c62f54 651->678 653->654 675 2c57ae7-2c57afb call 2c58fd9 654->675 676 2c57979-2c579c1 call 2c5a6fb 654->676 665->651 675->531 688 2c579c7-2c579ce 676->688 689 2c57ab1-2c57ae2 call 2c583c0 call 2c533b2 676->689 677->678 687 2c575ca 677->687 690 2c57607-2c5761f call 2c63b2c 678->690 691 2c57738-2c5773b 678->691 692 2c575cf-2c575e1 call 2c62830 687->692 694 2c579d1-2c579d6 688->694 689->675 700 2c57621-2c57629 call 2c5970d 690->700 701 2c5762b 690->701 691->579 707 2c575e6-2c575f6 call 2c635c6 692->707 708 2c575e3 692->708 694->694 698 2c579d8-2c57a23 call 2c5a6fb 694->698 698->689 713 2c57a29-2c57a2f 698->713 706 2c5762d-2c576e5 call 2c5a825 call 2c53863 call 2c55119 call 2c53863 call 2c5aacb call 2c5abe5 700->706 701->706 733 2c576e7 call 2c5380b 706->733 734 2c576ec-2c57717 Sleep call 2c618d0 706->734 707->678 707->692 708->707 716 2c57a32-2c57a37 713->716 716->716 717 2c57a39-2c57a74 call 2c5a6fb 716->717 717->689 723 2c57a76-2c57ab0 call 2c5d0ed 717->723 723->689 733->734 738 2c57723-2c57731 734->738 739 2c57719-2c57722 call 2c54100 734->739 738->691 741 2c57733 call 2c5380b 738->741 739->738 741->691
                                                                  Strings
                                                                  • cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d, xrefs: 02C5666F
                                                                  • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02C56739
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d
                                                                  • API String ID: 0-3100210275
                                                                  • Opcode ID: 153a76e445829bf015b070ebd64ed1d13c8fff9293354526e4cf1e98cee6a1f2
                                                                  • Instruction ID: ca78f749bc63aaf45cb5147b512dc156acdf74ff42dcd31d27e6eddf80bb39c7
                                                                  • Opcode Fuzzy Hash: 153a76e445829bf015b070ebd64ed1d13c8fff9293354526e4cf1e98cee6a1f2
                                                                  • Instruction Fuzzy Hash: 59A104718483609FD324AF349C89B6BFBE4EF86314F20095EF98497281DB758949CB97

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 770 401f64-401f84 FindResourceA 771 401f86-401f9d GetLastError SizeofResource 770->771 772 401f9f-401fa1 770->772 771->772 773 401fa6-401fec LoadResource LockResource GlobalAlloc call 402900 * 2 771->773 774 402096-40209a 772->774 779 401fee-401ff9 773->779 779->779 780 401ffb-402003 GetTickCount 779->780 781 402032-402038 780->781 782 402005-402007 780->782 783 402053-402083 GlobalAlloc call 401c26 781->783 785 40203a-40204a 781->785 782->783 784 402009-40200f 782->784 792 402088-402093 783->792 784->783 786 402011-402023 784->786 787 40204c 785->787 788 40204e-402051 785->788 790 402025 786->790 791 402027-40202a 786->791 787->788 788->783 788->785 790->791 791->786 793 40202c-40202e 791->793 792->774 793->784 794 402030 793->794 794->783
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                  • GetLastError.KERNEL32 ref: 00401F86
                                                                  • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                  • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                  • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                  • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                  • GetTickCount.KERNEL32 ref: 00401FFB
                                                                  • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                  • String ID:
                                                                  • API String ID: 564119183-0
                                                                  • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                  • Instruction ID: 5f40b5bb2c798fd06435bc38b1d437300a77b6e6fc54339f6675bf13ecd45336
                                                                  • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                  • Instruction Fuzzy Hash: 45314E71A00255AFDB105FB59F8896F7F68EF45344F10807AFE86F7281DA748845C7A8

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetVersion.KERNEL32 ref: 00402ED6
                                                                    • Part of subcall function 00403FF4: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                                    • Part of subcall function 00403FF4: HeapDestroy.KERNEL32 ref: 00404044
                                                                  • GetCommandLineA.KERNEL32 ref: 00402F24
                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00402F4F
                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F72
                                                                    • Part of subcall function 00402FCB: ExitProcess.KERNEL32 ref: 00402FE8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                  • String ID: @6h$Y
                                                                  • API String ID: 2057626494-1877685705
                                                                  • Opcode ID: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                                  • Instruction ID: ae24bdd31f92ba5c0019e7eb98566f973638ce5b9b082510a96f2684413349a7
                                                                  • Opcode Fuzzy Hash: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                                  • Instruction Fuzzy Hash: 3721A1B1840615ABDB14AFA6DE4AA6E7FB8EF44705F10413FF501B72D1DB384500CB58

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 919 40276d-402774 921 402776-402779 919->921 922 4027ca-4027d3 919->922 923 40278f-40279a RegQueryValueExA 921->923 922->923 924 40d449 923->924 925 40d1b6-40d1b9 924->925 926 40d44f-40d451 924->926 925->924 928 40d456-40d461 RegCloseKey 925->928 927 40d466 926->927 927->927 928->927 929 40d677-40dad6 928->929 931 40dad7 929->931 931->931
                                                                  APIs
                                                                  • RegQueryValueExA.KERNELBASE(?,Common AppData), ref: 00402792
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID: Common AppData
                                                                  • API String ID: 3660427363-2574214464
                                                                  • Opcode ID: 158ae254c2c16aa740a981b966b7fddd2cbe96f16fcdc6f9a27de899f2d968d4
                                                                  • Instruction ID: 9a277ccd48b8da7b9e07736cee9e399eb09a3ecf5512108b267f3c7f6d774d12
                                                                  • Opcode Fuzzy Hash: 158ae254c2c16aa740a981b966b7fddd2cbe96f16fcdc6f9a27de899f2d968d4
                                                                  • Instruction Fuzzy Hash: FFE09270C18104EBCB010BE04E0897E37747A087257314E77E423760E1C7BE580AB69F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 932 2c51aa9-2c51ac3 InterlockedIncrement 933 2c51ac5-2c51ad7 WSAStartup InterlockedExchange 932->933 934 2c51add-2c51ae0 932->934 933->934
                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(02C872AC), ref: 02C51ABA
                                                                  • WSAStartup.WS2_32(00000002,00000000), ref: 02C51ACB
                                                                  • InterlockedExchange.KERNEL32(02C872B0,00000000), ref: 02C51AD7
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$ExchangeIncrementStartup
                                                                  • String ID:
                                                                  • API String ID: 1856147945-0
                                                                  • Opcode ID: 0dc8780c7c47b5a12c2f4dd569edb5f3b8e454c1868d439314f214d4ef8c0fd7
                                                                  • Instruction ID: 80aa5ba344de8d5a2228135c679c00bf9b5537c4ebf31b7937dd1879f2a010d7
                                                                  • Opcode Fuzzy Hash: 0dc8780c7c47b5a12c2f4dd569edb5f3b8e454c1868d439314f214d4ef8c0fd7
                                                                  • Instruction Fuzzy Hash: 61D05E7599021CABE32176A0AC0EB78F72CF705625F100765FC6AC00C0EA90562C86E7

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetCommandLineW.KERNEL32 ref: 0040279F
                                                                  • CommandLineToArgvW.SHELL32(00000000), ref: 00402895
                                                                  • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D9FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CommandLine$ArgvLocalTime
                                                                  • String ID:
                                                                  • API String ID: 3768950922-0
                                                                  • Opcode ID: b9f1d27c841553a6286a37432cf0b285126cb2c39f5f0c794a39fb817397f4e9
                                                                  • Instruction ID: de3cc8fe9ec75cbd48575bc385f6373e9aba7dd0c2470f36669371c28cae3d1f
                                                                  • Opcode Fuzzy Hash: b9f1d27c841553a6286a37432cf0b285126cb2c39f5f0c794a39fb817397f4e9
                                                                  • Instruction Fuzzy Hash: 5ED09271805102EFC3042BE09F0812936A4AA093453610A3EE243B51E0CB78104EAB2E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 968 40d19e-40d532 RegCreateKeyExA 970 40d5d0-40d5ed 968->970 971 40d538-40d548 968->971 973 40daee-40db2d 970->973 972 40d808-40d80e 971->972 972->973 975 40db33 973->975 975->975
                                                                  APIs
                                                                  • RegCreateKeyExA.KERNELBASE(80000002,Software\SmallTour), ref: 0040D52A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID: Software\SmallTour
                                                                  • API String ID: 2289755597-3113880327
                                                                  • Opcode ID: eb4e32b9e61e82fc7f8fc0274ee4e68f45f73c1359f364c673ce3dd768ed4775
                                                                  • Instruction ID: 927dd9ebb52ca5c25177259832990301b57c9ecb35a80484e5a468b18b7f84d1
                                                                  • Opcode Fuzzy Hash: eb4e32b9e61e82fc7f8fc0274ee4e68f45f73c1359f364c673ce3dd768ed4775
                                                                  • Instruction Fuzzy Hash: E101A736D04101EBD6404B70BE61AE27BB5A716B95724417BD592731A3D238890BDA2E
                                                                  APIs
                                                                  • RegSetValueExA.KERNELBASE(?), ref: 0040D5C1
                                                                  • RegCloseKey.KERNELBASE(?), ref: 0040D5CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CloseValue
                                                                  • String ID:
                                                                  • API String ID: 3132538880-0
                                                                  • Opcode ID: 713251547485dac0a2bbd8a3e555094c32b96ee7312fc95f47136c58e5ae1e1e
                                                                  • Instruction ID: e6331f095b514331b0d29c0ebab7d5f4f3fc4baceba449352ef9d25cf3a5f709
                                                                  • Opcode Fuzzy Hash: 713251547485dac0a2bbd8a3e555094c32b96ee7312fc95f47136c58e5ae1e1e
                                                                  • Instruction Fuzzy Hash: 53F06236D05141DBC7054BB0FE61AA57BF1B65ABA1325813AD58272272C334890ADB19
                                                                  APIs
                                                                  • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                                    • Part of subcall function 00403EAC: GetVersionExA.KERNEL32 ref: 00403ECB
                                                                  • HeapDestroy.KERNEL32 ref: 00404044
                                                                    • Part of subcall function 004043CB: HeapAlloc.KERNEL32(00000000,00000140,0040402D,000003F8), ref: 004043D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocCreateDestroyVersion
                                                                  • String ID:
                                                                  • API String ID: 2507506473-0
                                                                  • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                  • Instruction ID: b1684c5e0161eeb02f30399066ba6d75b4260e35b9d13e26dc8fbe5d47634710
                                                                  • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                  • Instruction Fuzzy Hash: F5F092F0656301DAEB301B75AE46B3A39949BC0796F20443BF740F91E1EF7C8481960D
                                                                  APIs
                                                                  • RegCloseKey.KERNELBASE(?), ref: 0040D5CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID:
                                                                  • API String ID: 3535843008-0
                                                                  • Opcode ID: 602ae3e857ddb9a477b990e8c51bbb5b03d0f4ff67d1b8e24c6534ee993f563a
                                                                  • Instruction ID: a36abb13542148fe0e2184bce6fc4a30d84a4443659d953cd64425ef62fa15e7
                                                                  • Opcode Fuzzy Hash: 602ae3e857ddb9a477b990e8c51bbb5b03d0f4ff67d1b8e24c6534ee993f563a
                                                                  • Instruction Fuzzy Hash: 47117139904252DBC3018B74EE55AA57FB0F61B750318457AC8D162363C334DD0BDB5C
                                                                  APIs
                                                                  • RegCloseKey.KERNELBASE(?), ref: 0040D5CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID:
                                                                  • API String ID: 3535843008-0
                                                                  • Opcode ID: e6f74f1aae8f8915e941b36548827f360267f7e4e505bab853985922fbd2a965
                                                                  • Instruction ID: b75ff2dc20aaa2e6f21dbf5a413c5fb9bbeedf7bbd5764e02b2ca00ed5a47c52
                                                                  • Opcode Fuzzy Hash: e6f74f1aae8f8915e941b36548827f360267f7e4e505bab853985922fbd2a965
                                                                  • Instruction Fuzzy Hash: E201F53A8052629BCB018B74FE61691BFB1F65A7A1324427AD5D263273C7358C0BC758
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c8a000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: 176542e9f48ebae08642a828cca8b9952e713307d605857cae1e8d1fc4cedf0f
                                                                  • Instruction ID: 5b30e7554225d64f0d92fdd1bb9a0f3548dd08dc0d1ff28b552236511e0287e4
                                                                  • Opcode Fuzzy Hash: 176542e9f48ebae08642a828cca8b9952e713307d605857cae1e8d1fc4cedf0f
                                                                  • Instruction Fuzzy Hash: 3D1109B211CA049FD719AF29E886779FBE8EF48710F06092DE6C5C3740EA315444CA9B
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: c377e47094d1c1f418745f8923c2daa3cfa784174354ddc77f39fa208488e0e1
                                                                  • Instruction ID: dad39ec4c4a36b0a020ba36cb40b54c5f2fcb52c5045fa4b7e1fd514a1d859ca
                                                                  • Opcode Fuzzy Hash: c377e47094d1c1f418745f8923c2daa3cfa784174354ddc77f39fa208488e0e1
                                                                  • Instruction Fuzzy Hash: 02014B34A0030ACBDB14CFA9D8D0B9637A0BB05750F6446AAD965EB295D734D90ACF26
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CopyFile
                                                                  • String ID:
                                                                  • API String ID: 1304948518-0
                                                                  • Opcode ID: c990979c1844e3b86e7c6809e5fb8eb5e46c0e9cbd060de99f8df69504127ef8
                                                                  • Instruction ID: 32c96c72d1fdc658770ac6147e863496cde44dd24ac3f560ed056d496bb7c34d
                                                                  • Opcode Fuzzy Hash: c990979c1844e3b86e7c6809e5fb8eb5e46c0e9cbd060de99f8df69504127ef8
                                                                  • Instruction Fuzzy Hash: A1C08CA494C216F9D00025A00F8CF33215C8700788B20817B3903B10C1C4BC948BF03F
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02C56203
                                                                    • Part of subcall function 02C62F8C: __FF_MSGBANNER.LIBCMT ref: 02C62FA3
                                                                    • Part of subcall function 02C62F8C: __NMSG_WRITE.LIBCMT ref: 02C62FAA
                                                                    • Part of subcall function 02C62F8C: RtlAllocateHeap.NTDLL(00680000,00000000,00000001), ref: 02C62FCF
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap_malloc
                                                                  • String ID:
                                                                  • API String ID: 501242067-0
                                                                  • Opcode ID: dc7c132d67aafab87397cbb161f38c27fba4595563d512ad060e5800187056c7
                                                                  • Instruction ID: b08e9e7a8e30076cdf01a79fcbf3215a3aef6897d6ddfbb69aa5b512d356ed5c
                                                                  • Opcode Fuzzy Hash: dc7c132d67aafab87397cbb161f38c27fba4595563d512ad060e5800187056c7
                                                                  • Instruction Fuzzy Hash: 72C0127090920A7F870CAAA9188585FBDBC9704701F10416DA50596281D570094085A6
                                                                  APIs
                                                                  • CreateDirectoryA.KERNELBASE ref: 0040220C
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectory
                                                                  • String ID:
                                                                  • API String ID: 4241100979-0
                                                                  • Opcode ID: 4bd4fa03f0a192a976a056be9e61e5c0d78db41fa319a90d6d207b85695bff87
                                                                  • Instruction ID: eeb2a21f5a177b313222c4024f32d818217300d85d52e7011245ffeeed06a56a
                                                                  • Opcode Fuzzy Hash: 4bd4fa03f0a192a976a056be9e61e5c0d78db41fa319a90d6d207b85695bff87
                                                                  • Instruction Fuzzy Hash: B0B0927408A924E2C60223B00F1DDAF202C2E0A781331807BB682700D14AFC1A0B22BF
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID:
                                                                  • API String ID: 71445658-0
                                                                  • Opcode ID: ac16492dc500231346d158f7620a563ccfadfa18a928bd35894e83afd742e737
                                                                  • Instruction ID: a130fa5e48b560970f07615ca9469a598ec7d6b9975e09baeb9bbecdfdaf3fbf
                                                                  • Opcode Fuzzy Hash: ac16492dc500231346d158f7620a563ccfadfa18a928bd35894e83afd742e737
                                                                  • Instruction Fuzzy Hash: 93C00230A18116DBD7448AF18B482AA66A46B40348F6149BB9417B25C0E7BD968E6A1F
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: ManagerOpen
                                                                  • String ID:
                                                                  • API String ID: 1889721586-0
                                                                  • Opcode ID: a7b0b7e89708bd837af10ae4be236a98302593f610d11f17fd14d8da2e32efd4
                                                                  • Instruction ID: 942287d6cc7425515ac5a4c5928e916850624a1805b0f3c2f8add6f4f2a1b579
                                                                  • Opcode Fuzzy Hash: a7b0b7e89708bd837af10ae4be236a98302593f610d11f17fd14d8da2e32efd4
                                                                  • Instruction Fuzzy Hash: 6E9002302044129AC6900E105B9C018255351403163610439D786E40E4CA744489A51E
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c8a000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 04bb44353ebf7b4c18ad34af7d129917bc4d122c9551fc33667139dc8f5d175e
                                                                  • Instruction ID: 54f94ecbd3998e8eb15ff03187884fb64093822161b4d6d0c7dafefc9cd4af21
                                                                  • Opcode Fuzzy Hash: 04bb44353ebf7b4c18ad34af7d129917bc4d122c9551fc33667139dc8f5d175e
                                                                  • Instruction Fuzzy Hash: 8C318FB290D610AFE3056E19DC81BBAB7E8EF58760F06492EEAC5C3200E6355840C6D7
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1452528299-0
                                                                  • Opcode ID: 7b6db3901bd67a4416983e2a8edd626fbd5c53e8406e17de7cd64e884ba0ab48
                                                                  • Instruction ID: 19d457f24e78600376c53a8485c156f40cee28a1337523e6f748313ffbe2c5e4
                                                                  • Opcode Fuzzy Hash: 7b6db3901bd67a4416983e2a8edd626fbd5c53e8406e17de7cd64e884ba0ab48
                                                                  • Instruction Fuzzy Hash: E9214935808242DBD704CFB4EE917A17BB0B705750F28827BC596B31E2C378890ADB1E
                                                                  APIs
                                                                  • Sleep.KERNELBASE(000007D0), ref: 0040D62B
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 1dd41e6686bd822ea595729d237ab53c9cdcc9704c691854a431aa7eaaa3c26a
                                                                  • Instruction ID: 0b6dd63b63fbbc38307b0e82f0bb62100026e0ae42352c4b099ee0d801dcd9a1
                                                                  • Opcode Fuzzy Hash: 1dd41e6686bd822ea595729d237ab53c9cdcc9704c691854a431aa7eaaa3c26a
                                                                  • Instruction Fuzzy Hash: 33E0D861C0C7C0AFC3022A604A58A79BB18BF29304F2519B7E442761D1E43E0807A77F
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000), ref: 004026C3
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: eedf54f1546ecde272d8f04992911208c152afd1baa7028af89c0e707a28f26e
                                                                  • Instruction ID: 74f137ddbcde1c77c26fe787cba9ddbea217936d1492596de739919d1302819c
                                                                  • Opcode Fuzzy Hash: eedf54f1546ecde272d8f04992911208c152afd1baa7028af89c0e707a28f26e
                                                                  • Instruction Fuzzy Hash: D5E0C271C14304AFC7019B248D8469EB7F4AF05320F018A6AF175B32C0C77C6929DBDA
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000), ref: 004026C3
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 439dd529b9abb2b2adc7dce84e893a85a3a44bed3194729940265dbcb0abde27
                                                                  • Instruction ID: d24ba4203171b81c8d1ff0907d4106163ffdccce9a791f9bef02934f7126e645
                                                                  • Opcode Fuzzy Hash: 439dd529b9abb2b2adc7dce84e893a85a3a44bed3194729940265dbcb0abde27
                                                                  • Instruction Fuzzy Hash: D5D0C2318002049FD300AB408A45BAAB3B0BB04300F10803AE051721C0C3B858299BDA
                                                                  APIs
                                                                  • Sleep.KERNELBASE(000007D0), ref: 0040D62B
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: df2313319e77dccb116f50e8ab8f6206455693badbc0acb58ba5efbf54a0ed84
                                                                  • Instruction ID: eea654838261cd072344f1549b98415cc54984fc4591f7fcd9b81e2a24225462
                                                                  • Opcode Fuzzy Hash: df2313319e77dccb116f50e8ab8f6206455693badbc0acb58ba5efbf54a0ed84
                                                                  • Instruction Fuzzy Hash: 10A00131E88A0096E6402AE46F1AB3A2620BB05B01F26192B624A784D449BE144A6B9B
                                                                  APIs
                                                                    • Part of subcall function 02C59AAF: __EH_prolog.LIBCMT ref: 02C59AB4
                                                                    • Part of subcall function 02C59AAF: _Allocate.LIBCPMT ref: 02C59B0B
                                                                    • Part of subcall function 02C59AAF: _memmove.LIBCMT ref: 02C59B62
                                                                  • _memset.LIBCMT ref: 02C60919
                                                                  • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C60982
                                                                  • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C6098A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                                  • String ID: Unknown error$invalid string position
                                                                  • API String ID: 1854462395-1837348584
                                                                  • Opcode ID: bcd34afd868bd55e7d5c3f70e6c24d69de4f9cfcab1044d305f0cb6671ac5c22
                                                                  • Instruction ID: 645ab9288d2bdfc5d51da7482b09ed64adc5fde8cfa30c6cd48e0d6ba174e945
                                                                  • Opcode Fuzzy Hash: bcd34afd868bd55e7d5c3f70e6c24d69de4f9cfcab1044d305f0cb6671ac5c22
                                                                  • Instruction Fuzzy Hash: D951BD70248341DFE714CF25C894B2FBBE5BB98748F50092DE482A7692D772D688CB96
                                                                  APIs
                                                                  • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D15A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CtrlDispatcherServiceStart
                                                                  • String ID: test
                                                                  • API String ID: 3789849863-3632233996
                                                                  • Opcode ID: 62d4dfb808210626677f020231cc8997fd32626447a6781c4c939b5edb5d32bc
                                                                  • Instruction ID: 73591cfe463514ed459f964e2c340f9966edd9af912481339b9f9d215462bc13
                                                                  • Opcode Fuzzy Hash: 62d4dfb808210626677f020231cc8997fd32626447a6781c4c939b5edb5d32bc
                                                                  • Instruction Fuzzy Hash: EEE01274D08344E9EB10DFA08A489796774AB45300B308077D50AB62D5C77D4E4F7A0F
                                                                  APIs
                                                                  • CreateServiceA.ADVAPI32 ref: 0040D3E8
                                                                  • CloseServiceHandle.ADVAPI32(?), ref: 0040D3F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Service$CloseCreateHandle
                                                                  • String ID:
                                                                  • API String ID: 1873643653-0
                                                                  • Opcode ID: dbbf10d3d4f90bdd11982929392454f3b4702c9dbdfe5cd029521d635c4322fa
                                                                  • Instruction ID: 569c7dc1a6a3224979b4ee1e760b0c65d326e05aa0229ed68e38a6959c0f0250
                                                                  • Opcode Fuzzy Hash: dbbf10d3d4f90bdd11982929392454f3b4702c9dbdfe5cd029521d635c4322fa
                                                                  • Instruction Fuzzy Hash: D8C08C30808000EBCF209FA09F0C4183630A38032032280B9E082B20A0CB389D0EBB2C
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02C64E76,?,?,?,00000001), ref: 02C6950D
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02C69516
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: 308ef0e0d73ab8185c7f95aaed134036eecee4c7c04848c8255b4a9a9744a885
                                                                  • Instruction ID: 90f6ad015ad1614c4d369e3cb6a0f2473d2fa2541db98a24d824a325cd900c37
                                                                  • Opcode Fuzzy Hash: 308ef0e0d73ab8185c7f95aaed134036eecee4c7c04848c8255b4a9a9744a885
                                                                  • Instruction Fuzzy Hash: 07B0923148420CEBCB012B91EC0DB89BF28FB046A2F004910F60E440508B6254289AE1
                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C51D11
                                                                  • GetLastError.KERNEL32 ref: 02C51D23
                                                                    • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C51D59
                                                                  • GetLastError.KERNEL32 ref: 02C51D6B
                                                                  • __beginthreadex.LIBCMT ref: 02C51DB1
                                                                  • GetLastError.KERNEL32 ref: 02C51DC6
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C51DDD
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C51DEC
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C51E14
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C51E1B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                  • String ID: thread$thread.entry_event$thread.exit_event
                                                                  • API String ID: 831262434-3017686385
                                                                  • Opcode ID: 2d94d03022bbc0dedb44d478e1fb0e4d4e9bc766f13aaad035c7019da59bd27e
                                                                  • Instruction ID: 57044fe7f9fd87190811dc0d0f0714d48c03d6b995dc70f364bd08580eda8489
                                                                  • Opcode Fuzzy Hash: 2d94d03022bbc0dedb44d478e1fb0e4d4e9bc766f13aaad035c7019da59bd27e
                                                                  • Instruction Fuzzy Hash: D831AB719403159FD700EF24C888B2BBBA9FB84750F144A6DF8599B291DBB0D989CFD2
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C524E6
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02C524FC
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C5250E
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C5256D
                                                                  • SetLastError.KERNEL32(00000000,?,7622DFB0), ref: 02C5257F
                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,7622DFB0), ref: 02C52599
                                                                  • GetLastError.KERNEL32(?,7622DFB0), ref: 02C525A2
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C525F0
                                                                  • InterlockedDecrement.KERNEL32(00000002), ref: 02C5262F
                                                                  • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02C5268E
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C52699
                                                                  • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02C526AD
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,7622DFB0), ref: 02C526BD
                                                                  • GetLastError.KERNEL32(?,7622DFB0), ref: 02C526C7
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                  • String ID:
                                                                  • API String ID: 1213838671-0
                                                                  • Opcode ID: a6f9e745d49c7ce74c10b4690dba00d693bef7f29dd941fd427719b59fbae4e2
                                                                  • Instruction ID: 44cbee8cdffd3ea9eae4f97cc3434d37220da3a1a253e20cc607f42955f88e50
                                                                  • Opcode Fuzzy Hash: a6f9e745d49c7ce74c10b4690dba00d693bef7f29dd941fd427719b59fbae4e2
                                                                  • Instruction Fuzzy Hash: D0612F71940219AFCB11DFA4C988AAEFBF9FF48310F10456AE916E3240D734DA58CFA5
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C54608
                                                                    • Part of subcall function 02C63B2C: _malloc.LIBCMT ref: 02C63B44
                                                                  • htons.WS2_32(?), ref: 02C54669
                                                                  • htonl.WS2_32(?), ref: 02C5468C
                                                                  • htonl.WS2_32(00000000), ref: 02C54693
                                                                  • htons.WS2_32(00000000), ref: 02C54747
                                                                  • _sprintf.LIBCMT ref: 02C5475D
                                                                    • Part of subcall function 02C58962: _memmove.LIBCMT ref: 02C58982
                                                                  • htons.WS2_32(?), ref: 02C546B0
                                                                    • Part of subcall function 02C5970D: __EH_prolog.LIBCMT ref: 02C59712
                                                                    • Part of subcall function 02C5970D: RtlEnterCriticalSection.NTDLL(00000020), ref: 02C5978D
                                                                    • Part of subcall function 02C5970D: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C597AB
                                                                    • Part of subcall function 02C51BA7: __EH_prolog.LIBCMT ref: 02C51BAC
                                                                    • Part of subcall function 02C51BA7: RtlEnterCriticalSection.NTDLL ref: 02C51BBC
                                                                    • Part of subcall function 02C51BA7: RtlLeaveCriticalSection.NTDLL ref: 02C51BEA
                                                                    • Part of subcall function 02C51BA7: RtlEnterCriticalSection.NTDLL ref: 02C51C13
                                                                    • Part of subcall function 02C51BA7: RtlLeaveCriticalSection.NTDLL ref: 02C51C56
                                                                    • Part of subcall function 02C5DEC9: __EH_prolog.LIBCMT ref: 02C5DECE
                                                                  • htonl.WS2_32(?), ref: 02C5497C
                                                                  • htonl.WS2_32(00000000), ref: 02C54983
                                                                  • htonl.WS2_32(00000000), ref: 02C549C8
                                                                  • htonl.WS2_32(00000000), ref: 02C549CF
                                                                  • htons.WS2_32(?), ref: 02C549EF
                                                                  • htons.WS2_32(?), ref: 02C549F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                  • String ID:
                                                                  • API String ID: 1645262487-0
                                                                  • Opcode ID: c5b29de529f0a7f1588f5821a89284f6f983722372847f609888acf048cd748d
                                                                  • Instruction ID: 85de4fb93ade5ee6df39a077537342dacfd431950673fb46312e42276f0e479a
                                                                  • Opcode Fuzzy Hash: c5b29de529f0a7f1588f5821a89284f6f983722372847f609888acf048cd748d
                                                                  • Instruction Fuzzy Hash: 67024A71C00269EEDF25DFA4C844BEEBBB9AF14304F10415AE905B7280DB749AC8DFA5
                                                                  APIs
                                                                  • RegisterServiceCtrlHandlerA.ADVAPI32(EMAIL Safe Storage 10.2.46,Function_0000235E), ref: 004023C1
                                                                  • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                                  • GetLastError.KERNEL32 ref: 00402422
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                  • GetLastError.KERNEL32 ref: 00402450
                                                                  • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                  • CloseHandle.KERNEL32 ref: 004024A1
                                                                  • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                                  Strings
                                                                  • EMAIL Safe Storage 10.2.46, xrefs: 004023BC
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                  • String ID: EMAIL Safe Storage 10.2.46
                                                                  • API String ID: 3346042915-4190116034
                                                                  • Opcode ID: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                                  • Instruction ID: b8fe7bda3a7dcfcb82ad829e681adc6a99cb3bee06a9baca5ac2dc3afb04543b
                                                                  • Opcode Fuzzy Hash: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                                  • Instruction Fuzzy Hash: E121C570441214EBC2105F16EFE9A267FA8FBD5794711823EE544B22B2CBB90549CFAD
                                                                  APIs
                                                                  • RtlDecodePointer.NTDLL(?), ref: 02C6831A
                                                                  • _free.LIBCMT ref: 02C68333
                                                                    • Part of subcall function 02C62F54: HeapFree.KERNEL32(00000000,00000000,?,02C65CB2,00000000,00000104,76230A60), ref: 02C62F68
                                                                    • Part of subcall function 02C62F54: GetLastError.KERNEL32(00000000,?,02C65CB2,00000000,00000104,76230A60), ref: 02C62F7A
                                                                  • _free.LIBCMT ref: 02C68346
                                                                  • _free.LIBCMT ref: 02C68364
                                                                  • _free.LIBCMT ref: 02C68376
                                                                  • _free.LIBCMT ref: 02C68387
                                                                  • _free.LIBCMT ref: 02C68392
                                                                  • _free.LIBCMT ref: 02C683B6
                                                                  • RtlEncodePointer.NTDLL(006A55F0), ref: 02C683BD
                                                                  • _free.LIBCMT ref: 02C683D2
                                                                  • _free.LIBCMT ref: 02C683E8
                                                                  • _free.LIBCMT ref: 02C68410
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 3064303923-0
                                                                  • Opcode ID: b1fcc4b72bd0e856b39f738845ecbe3bf1b424b81d289e15d6eabdc6389044e4
                                                                  • Instruction ID: 747e24352521fca97d547742c84c7d57d6f2604984f8d09b8c9546d0672bdef4
                                                                  • Opcode Fuzzy Hash: b1fcc4b72bd0e856b39f738845ecbe3bf1b424b81d289e15d6eabdc6389044e4
                                                                  • Instruction Fuzzy Hash: 7B216D32D442608FDB25AF14ECC87257B69BB447243298B39E80CA7240CB35996DDF9A
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C54D8B
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C54DB7
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C54DC3
                                                                    • Part of subcall function 02C54BED: __EH_prolog.LIBCMT ref: 02C54BF2
                                                                    • Part of subcall function 02C54BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C54CF2
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C54E93
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C54E99
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C54EA0
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C54EA6
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C550A7
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C550AD
                                                                  • RtlEnterCriticalSection.NTDLL(02C871E0), ref: 02C550B8
                                                                  • RtlLeaveCriticalSection.NTDLL(02C871E0), ref: 02C550C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                  • String ID:
                                                                  • API String ID: 2062355503-0
                                                                  • Opcode ID: 518a575f772c8c33978a5a93cc011fa56d3df6515b8e9775766b5bb26ec8abde
                                                                  • Instruction ID: 6bfe04dfe1d805d6b4ee9143bf5da1e6e6ab9268bdd42a50eda7ffd4cf8f5e24
                                                                  • Opcode Fuzzy Hash: 518a575f772c8c33978a5a93cc011fa56d3df6515b8e9775766b5bb26ec8abde
                                                                  • Instruction Fuzzy Hash: 52B16E75D0026DDFDF25DF90C844BEEBBB5AF44314F20419AE80576280DBB49A89CF95
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BBD
                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BD1
                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BFD
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C35
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C57
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C70
                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403C83
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403CC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                  • String ID: 4/@
                                                                  • API String ID: 1823725401-3101945251
                                                                  • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                  • Instruction ID: a2970ceca2a6c3f976dc545d3d2173026391ae6ff2d108e1c7f08cdddd2a955e
                                                                  • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                  • Instruction Fuzzy Hash: AD31F27350C1245EE7202F785DC883B7E9CEA4534A711093FF942F3380EA798E81466D
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C53428
                                                                  • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02C5346B
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02C53472
                                                                  • GetLastError.KERNEL32 ref: 02C53486
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C534D7
                                                                  • RtlEnterCriticalSection.NTDLL(00000018), ref: 02C534ED
                                                                  • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02C53518
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                  • String ID: CancelIoEx$KERNEL32
                                                                  • API String ID: 2902213904-434325024
                                                                  • Opcode ID: 2156e044d73269b2257001e2f94dcbd800f71347ace1c1dfedb2ecd70b2f5e57
                                                                  • Instruction ID: 1c807776661db9f62c06b9f1869c34f68530cb8ce58722a09e2e89cce8684232
                                                                  • Opcode Fuzzy Hash: 2156e044d73269b2257001e2f94dcbd800f71347ace1c1dfedb2ecd70b2f5e57
                                                                  • Instruction Fuzzy Hash: 1931ADB1900359DFDB019F68C884BAABBF9FF88350F0085A9EC06AB241D770D944CFA1
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404381,?,Microsoft Visual C++ Runtime Library,00012010,?,0040858C,?,004085DC,?,?,?,Runtime Error!Program: ), ref: 0040658A
                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065A2
                                                                  • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065B3
                                                                  • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004065C0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad
                                                                  • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                  • API String ID: 2238633743-4044615076
                                                                  • Opcode ID: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                                  • Instruction ID: 34c45dea863b0ad37b671b2ee6745cf1fa65c172ae9c71c573f5c1b511995102
                                                                  • Opcode Fuzzy Hash: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                                  • Instruction Fuzzy Hash: FA017571A40201FFCB209FB5BFC492B3AE99B58690306193FB541F2291DE79C815DB68
                                                                  APIs
                                                                  • LCMapStringW.KERNEL32(00000000,00000100,00408658,00000001,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406899
                                                                  • LCMapStringA.KERNEL32(00000000,00000100,00408654,00000001,00000000,00000000,?,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004068B5
                                                                  • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406317,?,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 004068FE
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406936
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 0040698E
                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406317,00200020,00000000,?,00000000), ref: 004069A4
                                                                  • LCMapStringW.KERNEL32(00000000,?,00406317,00000000,00406317,?,?,00406317,00200020,00000000,?,00000000), ref: 004069D7
                                                                  • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 00406A3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: String$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 352835431-0
                                                                  • Opcode ID: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                                  • Instruction ID: 8dbeb6cb8c932cbdef2775d2a29e2de0fc7c35b208bd80b0a47b5516e3ba15ce
                                                                  • Opcode Fuzzy Hash: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                                  • Instruction Fuzzy Hash: 3E518A71500209EBCF219F94CD45AAF7BB5FB49714F12413AF912B12A0C73A8C21DB69
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 004042CA
                                                                  • GetStdHandle.KERNEL32(000000F4,0040858C,00000000,?,00000000,00000000), ref: 004043A0
                                                                  • WriteFile.KERNEL32(00000000), ref: 004043A7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandleModuleNameWrite
                                                                  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                  • API String ID: 3784150691-4022980321
                                                                  • Opcode ID: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                                  • Instruction ID: ad501088bf1d437e3d5a217a77e101a13ac7783d72fc0021c8d9dd27a33d1b06
                                                                  • Opcode Fuzzy Hash: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                                  • Instruction Fuzzy Hash: 52318772600218AFDF2096608E45FDA736DAF85304F1004BFF944B61D1EA789D458A5D
                                                                  APIs
                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,61F409A3), ref: 02C61690
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C616A5
                                                                  • ResetEvent.KERNEL32(00000000,61F409A3), ref: 02C616AF
                                                                  • CloseHandle.KERNEL32(00000000,61F409A3), ref: 02C616E4
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,61F409A3), ref: 02C6175A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C6176F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandle$CreateOpenReset
                                                                  • String ID:
                                                                  • API String ID: 1285874450-0
                                                                  • Opcode ID: ffe5be806e88d250ddeb8e1301edda40e1d3e26db146ffb064872011c60715bb
                                                                  • Instruction ID: d93f52a139b6ab49f51de119e53bb19f5ae7803e1eaba370af86af000cf3db8e
                                                                  • Opcode Fuzzy Hash: ffe5be806e88d250ddeb8e1301edda40e1d3e26db146ffb064872011c60715bb
                                                                  • Instruction Fuzzy Hash: A3413F74D043599FDF20CFA5C888BADBBB8EF45725F184219E419EB380D7B09A05CB90
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C520AC
                                                                  • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C520CD
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C520D8
                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02C5213E
                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02C5217A
                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02C52187
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C521A6
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                  • String ID:
                                                                  • API String ID: 1171374749-0
                                                                  • Opcode ID: 3bcfaab6bd22c6d3741b63c0941065b6fff653bcd394ba06c5bee5d4d3e51a84
                                                                  • Instruction ID: b593ffdd8f6fae552115be34a92a67ab7c0c7119ca07876dd2a5d92c56f0ec37
                                                                  • Opcode Fuzzy Hash: 3bcfaab6bd22c6d3741b63c0941065b6fff653bcd394ba06c5bee5d4d3e51a84
                                                                  • Instruction Fuzzy Hash: 1A4129715047059FC311DF25D888A6BBBF9FFC8654F044A2EF89A82650D730E949CFA6
                                                                  APIs
                                                                    • Part of subcall function 02C61EB0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02C6170E,?,?), ref: 02C61EDF
                                                                    • Part of subcall function 02C61EB0: CloseHandle.KERNEL32(00000000,?,?,02C6170E,?,?), ref: 02C61EF4
                                                                    • Part of subcall function 02C61EB0: SetEvent.KERNEL32(00000000,02C6170E,?,?), ref: 02C61F07
                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,61F409A3), ref: 02C61690
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C616A5
                                                                  • ResetEvent.KERNEL32(00000000,61F409A3), ref: 02C616AF
                                                                  • CloseHandle.KERNEL32(00000000,61F409A3), ref: 02C616E4
                                                                  • __CxxThrowException@8.LIBCMT ref: 02C61715
                                                                    • Part of subcall function 02C6453A: RaiseException.KERNEL32(?,?,02C5FB35,?,?,?,?,?,?,?,02C5FB35,?,02C80F98,?), ref: 02C6458F
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,61F409A3), ref: 02C6175A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C6176F
                                                                    • Part of subcall function 02C61BF0: GetCurrentProcessId.KERNEL32(?), ref: 02C61C49
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,61F409A3), ref: 02C6177F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                  • String ID:
                                                                  • API String ID: 2227236058-0
                                                                  • Opcode ID: 342e825ceb08056b1b1609051bd84629c10262edf324457f5d22d0627b231b42
                                                                  • Instruction ID: f34ac0404c4db5992e1c0ffdb4f9f85ef45b10da873fe570e353a96b8fdaa6ed
                                                                  • Opcode Fuzzy Hash: 342e825ceb08056b1b1609051bd84629c10262edf324457f5d22d0627b231b42
                                                                  • Instruction Fuzzy Hash: 1F314E75D043499BDF20DBA4DC88BBDB7B9AF45316F180229E91CEB380E7A09A058B51
                                                                  APIs
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C52706
                                                                  • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C5272B
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C75B33), ref: 02C52738
                                                                    • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                  • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02C52778
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C527D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                  • String ID: timer
                                                                  • API String ID: 4293676635-1792073242
                                                                  • Opcode ID: f36e6321705021b0f2a2e7ae695b8eac165f70aff9cb415cd43d0610f487b0a6
                                                                  • Instruction ID: 49c2fdc4ed2cd6affe92eaf3c0e0451d459c437a7a7c868241f9ecb63ba8ea85
                                                                  • Opcode Fuzzy Hash: f36e6321705021b0f2a2e7ae695b8eac165f70aff9cb415cd43d0610f487b0a6
                                                                  • Instruction Fuzzy Hash: 0631A0B1904716AFD310DF25C984B26BBE8FB48764F004A2EFC5593680D770E958CF9A
                                                                  APIs
                                                                  • __init_pointers.LIBCMT ref: 02C65D74
                                                                    • Part of subcall function 02C684E2: RtlEncodePointer.NTDLL(00000000), ref: 02C684E5
                                                                    • Part of subcall function 02C684E2: __initp_misc_winsig.LIBCMT ref: 02C68500
                                                                    • Part of subcall function 02C684E2: GetModuleHandleW.KERNEL32(kernel32.dll,?,02C81598,00000008,00000003,02C80F7C,?,00000001), ref: 02C69261
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02C69275
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02C69288
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02C6929B
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02C692AE
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02C692C1
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02C692D4
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02C692E7
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02C692FA
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02C6930D
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02C69320
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02C69333
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02C69346
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02C69359
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02C6936C
                                                                    • Part of subcall function 02C684E2: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02C6937F
                                                                  • __mtinitlocks.LIBCMT ref: 02C65D79
                                                                  • __mtterm.LIBCMT ref: 02C65D82
                                                                    • Part of subcall function 02C65DEA: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02C68918
                                                                    • Part of subcall function 02C65DEA: _free.LIBCMT ref: 02C6891F
                                                                    • Part of subcall function 02C65DEA: RtlDeleteCriticalSection.NTDLL(02C83978), ref: 02C68941
                                                                  • __calloc_crt.LIBCMT ref: 02C65DA7
                                                                  • __initptd.LIBCMT ref: 02C65DC9
                                                                  • GetCurrentThreadId.KERNEL32 ref: 02C65DD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                  • String ID:
                                                                  • API String ID: 3567560977-0
                                                                  • Opcode ID: fa718b3bf6ef2b9507e2c22daa383cb77cf73e9d86bf630f62bd470b2dc59003
                                                                  • Instruction ID: 073934336ecde71ea5de646411a23264e19f23be9bf44e481b051221a729955f
                                                                  • Opcode Fuzzy Hash: fa718b3bf6ef2b9507e2c22daa383cb77cf73e9d86bf630f62bd470b2dc59003
                                                                  • Instruction Fuzzy Hash: 50F0BE326887125EE7387BB97DCD77A2B86DF01BB4B704B29E464D60C0FF3189066960
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 02C634BB
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02C634C2
                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02C634CE
                                                                  • RtlDecodePointer.NTDLL(00000001), ref: 02C634EB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoInitialize$combase.dll
                                                                  • API String ID: 3489934621-340411864
                                                                  • Opcode ID: 7b7338c70293f394623a737ab985aed18ddef4d9f13bfdc4d7ad38803c710f41
                                                                  • Instruction ID: 834d57285f52899d560b79fc850bf7a58ad14a2c801157d74f161d23b36646e8
                                                                  • Opcode Fuzzy Hash: 7b7338c70293f394623a737ab985aed18ddef4d9f13bfdc4d7ad38803c710f41
                                                                  • Instruction Fuzzy Hash: 42E01A70ED0384ABEB201F70EC4DB267B69A740B02F208B64F50AE5180CBB5516C9F58
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02C63490), ref: 02C63590
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02C63597
                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02C635A2
                                                                  • RtlDecodePointer.NTDLL(02C63490), ref: 02C635BD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoUninitialize$combase.dll
                                                                  • API String ID: 3489934621-2819208100
                                                                  • Opcode ID: 37f7d85adc20eb86c5b3b15eff47df8a24afe78f278d58b245e06d46ad74a6f2
                                                                  • Instruction ID: 01f057c361cf86f19c2e5ee2f1f99f8871e1da8520aa57d2048617b6b7799606
                                                                  • Opcode Fuzzy Hash: 37f7d85adc20eb86c5b3b15eff47df8a24afe78f278d58b245e06d46ad74a6f2
                                                                  • Instruction Fuzzy Hash: F9E0B670DD0308ABEB505F60AD0DB167A69B740B05F208E64F606D6294DBB4562CDB98
                                                                  APIs
                                                                  • TlsGetValue.KERNEL32(FFFFFFFF,61F409A3,?,?,?,?,00000000,02C76A98,000000FF,02C621AA), ref: 02C61F4A
                                                                  • TlsSetValue.KERNEL32(FFFFFFFF,02C621AA,?,?,00000000), ref: 02C61FB7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02C61FE1
                                                                  • HeapFree.KERNEL32(00000000), ref: 02C61FE4
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: HeapValue$FreeProcess
                                                                  • String ID:
                                                                  • API String ID: 1812714009-0
                                                                  • Opcode ID: 1c0605e5e7baab52d099bce56e62f6af7635879344d79720e5977678e66fdc32
                                                                  • Instruction ID: 39ee7d35810c657a1e2f8cf5b1ec43b3c83df80cd92816eb7654bbbcb6277b68
                                                                  • Opcode Fuzzy Hash: 1c0605e5e7baab52d099bce56e62f6af7635879344d79720e5977678e66fdc32
                                                                  • Instruction Fuzzy Hash: 0951AF319043489FDB20CF29C888B26BBE5FB88764F198659E859D7390D771ED04CBD2
                                                                  APIs
                                                                  • _ValidateScopeTableHandlers.LIBCMT ref: 02C75770
                                                                  • __FindPESection.LIBCMT ref: 02C7578A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FindHandlersScopeSectionTableValidate
                                                                  • String ID:
                                                                  • API String ID: 876702719-0
                                                                  • Opcode ID: 4a463e3414fd91e485c44ec687a617f43b8f17af8b85faf10fd278c167bb27af
                                                                  • Instruction ID: a85dcd68d859e01a5e62cfc5a538a806931f88be6709e91ced6ec997c15fb78d
                                                                  • Opcode Fuzzy Hash: 4a463e3414fd91e485c44ec687a617f43b8f17af8b85faf10fd278c167bb27af
                                                                  • Instruction Fuzzy Hash: F1A1BD75E402158FDB21CF68C9807ADB7A5FF843A4FA48669DC15AB341E731ED02CBA1
                                                                  APIs
                                                                  • GetStringTypeW.KERNEL32(00000001,00408658,00000001,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040674D
                                                                  • GetStringTypeA.KERNEL32(00000000,00000001,00408654,00000001,?,?,00000000,00000000,00000001), ref: 00406767
                                                                  • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040679B
                                                                  • MultiByteToWideChar.KERNEL32(00406317,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004067D3
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406829
                                                                  • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040683B
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: StringType$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 3852931651-0
                                                                  • Opcode ID: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                                  • Instruction ID: 7abba187aa9a424c0dbe6a0d425d95b5373609879485ba3de4d3a8f21a169ece
                                                                  • Opcode Fuzzy Hash: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                                  • Instruction Fuzzy Hash: 11418D72901209EFCF209F94CD85EAF3B79FB04754F11453AF912F2290D73989608B99
                                                                  APIs
                                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02C51CB1
                                                                  • CloseHandle.KERNEL32(?), ref: 02C51CBA
                                                                  • InterlockedExchangeAdd.KERNEL32(02C87274,00000000), ref: 02C51CC6
                                                                  • TerminateThread.KERNEL32(?,00000000), ref: 02C51CD4
                                                                  • QueueUserAPC.KERNEL32(02C51E7C,?,00000000), ref: 02C51CE1
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02C51CEC
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1946104331-0
                                                                  • Opcode ID: fb6f05f2affb168f664ac3832b967af1536668d7100fc79c90b00fb1a8e64772
                                                                  • Instruction ID: 86189fe623418bad4a42a444d8695e2db3e05341b11132743f64ac3895d33681
                                                                  • Opcode Fuzzy Hash: fb6f05f2affb168f664ac3832b967af1536668d7100fc79c90b00fb1a8e64772
                                                                  • Instruction Fuzzy Hash: 8AF0A431540218BFDB105B96DD0DE57FFBCFB85720B00475DF52A82190DBB1A918CBA0
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02C52BE4
                                                                  • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C52C07
                                                                    • Part of subcall function 02C5A4DF: WSAGetLastError.WS2_32(00000000,?,?,02C52A51), ref: 02C5A4ED
                                                                  • WSASetLastError.WS2_32 ref: 02C52CD3
                                                                  • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C52CE7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Recvselect
                                                                  • String ID: 3'
                                                                  • API String ID: 886190287-280543908
                                                                  • Opcode ID: 9595f5b8c0d74952b68c0d6534820ed6736f3e43ecb4ffba6e6693b908b1ca05
                                                                  • Instruction ID: 32698544e314fb28003785301861cb5600a49486f658c50a86abee0fb7cddd3b
                                                                  • Opcode Fuzzy Hash: 9595f5b8c0d74952b68c0d6534820ed6736f3e43ecb4ffba6e6693b908b1ca05
                                                                  • Instruction Fuzzy Hash: 19418BB19443118FDB209F74C84876BBBE9BF94354F10091EEC9A93281EBB4D584CBA6
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32 ref: 00403ECB
                                                                  • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F00
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F60
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentFileModuleNameVariableVersion
                                                                  • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                  • API String ID: 1385375860-4131005785
                                                                  • Opcode ID: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                                  • Instruction ID: b9728f854654bad712525c43123df79641ae2587965f18a3091eb02ea7af310c
                                                                  • Opcode Fuzzy Hash: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                                  • Instruction Fuzzy Hash: 42312771D002896DEB319A309C45BDA7F7C9B12309F2400FBE545F52C2D6398F8A8718
                                                                  APIs
                                                                  • std::exception::exception.LIBCMT ref: 02C6195F
                                                                    • Part of subcall function 02C624B3: std::exception::_Copy_str.LIBCMT ref: 02C624CC
                                                                    • Part of subcall function 02C60D30: __CxxThrowException@8.LIBCMT ref: 02C60D8E
                                                                  • std::exception::exception.LIBCMT ref: 02C619BE
                                                                  Strings
                                                                  • boost unique_lock has no mutex, xrefs: 02C6194E
                                                                  • $, xrefs: 02C619C3
                                                                  • boost unique_lock owns already the mutex, xrefs: 02C619AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                  • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                  • API String ID: 2140441600-46888669
                                                                  • Opcode ID: e6980dd77f8f02020e449b1b8f686d8b25294c161d8b17d871434321466c710e
                                                                  • Instruction ID: 2294f82c561ee134ad7fb436f9982af39b080f97e0e667fa9dfa0ff8096d44af
                                                                  • Opcode Fuzzy Hash: e6980dd77f8f02020e449b1b8f686d8b25294c161d8b17d871434321466c710e
                                                                  • Instruction Fuzzy Hash: 902128B15083809FD720DF25C588B6BBBE5BB88B08F404E5DF5A587380D7B59408DF92
                                                                  APIs
                                                                  • __getptd_noexit.LIBCMT ref: 02C64A60
                                                                    • Part of subcall function 02C65C52: GetLastError.KERNEL32(76230A60,7622F550,02C65E40,02C63013,7622F550,?,02C5606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02C56508), ref: 02C65C54
                                                                    • Part of subcall function 02C65C52: __calloc_crt.LIBCMT ref: 02C65C75
                                                                    • Part of subcall function 02C65C52: __initptd.LIBCMT ref: 02C65C97
                                                                    • Part of subcall function 02C65C52: GetCurrentThreadId.KERNEL32 ref: 02C65C9E
                                                                    • Part of subcall function 02C65C52: SetLastError.KERNEL32(00000000,02C5606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02C56508), ref: 02C65CB6
                                                                  • __calloc_crt.LIBCMT ref: 02C64A83
                                                                  • __get_sys_err_msg.LIBCMT ref: 02C64AA1
                                                                  • __invoke_watson.LIBCMT ref: 02C64ABE
                                                                  Strings
                                                                  • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 02C64A6B, 02C64A91
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                                  • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                  • API String ID: 109275364-798102604
                                                                  • Opcode ID: a6a67b45e3332387c163675d2576b944090a52fbfe578201e76913048c3275c7
                                                                  • Instruction ID: 3ef437781216fd86b3e0fe19fc460681930fd498abf2e5b7fedc5ad1cdbf030c
                                                                  • Opcode Fuzzy Hash: a6a67b45e3332387c163675d2576b944090a52fbfe578201e76913048c3275c7
                                                                  • Instruction Fuzzy Hash: 3BF0E972680B157BEB39A5565CC8A7B72CEDF80AA0B000626FE49D6202E733DD007698
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52350
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52360
                                                                  • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C52370
                                                                  • GetLastError.KERNEL32 ref: 02C5237A
                                                                    • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                  • String ID: pqcs
                                                                  • API String ID: 1619523792-2559862021
                                                                  • Opcode ID: 36673725168f5cbaac317d20719ca3adb70febbe5a4fc653cb1934cb8154a5d2
                                                                  • Instruction ID: 88bd94696b5151553edc0e844f41810f4d4c40fd9a2f0da5bac9732a9f70a317
                                                                  • Opcode Fuzzy Hash: 36673725168f5cbaac317d20719ca3adb70febbe5a4fc653cb1934cb8154a5d2
                                                                  • Instruction Fuzzy Hash: 2CF0F471980319AFDB20AF749C49FABBBECFB44601F004669ED09D3140E771DA589B91
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C54035
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 02C54042
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02C54049
                                                                  • std::exception::exception.LIBCMT ref: 02C54063
                                                                    • Part of subcall function 02C5A6A0: __EH_prolog.LIBCMT ref: 02C5A6A5
                                                                    • Part of subcall function 02C5A6A0: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C5A6B4
                                                                    • Part of subcall function 02C5A6A0: __CxxThrowException@8.LIBCMT ref: 02C5A6D3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                  • String ID: bad allocation
                                                                  • API String ID: 3112922283-2104205924
                                                                  • Opcode ID: d3b3c5c0fa181451f176517fb720c0f2294a31563e0b1a87ce4354c24c352818
                                                                  • Instruction ID: e08cf954a3a44c66f016115aa01709514920f243b38d358be674c4593ed6ec43
                                                                  • Opcode Fuzzy Hash: d3b3c5c0fa181451f176517fb720c0f2294a31563e0b1a87ce4354c24c352818
                                                                  • Instruction Fuzzy Hash: DEF08CB1E4020DEBCB00EFE0C808BBFBB78FB08740F404A89E914A2640DB7482188F95
                                                                  APIs
                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00403D2D
                                                                  • GetFileType.KERNEL32(00000800), ref: 00403DD3
                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 00403E2C
                                                                  • GetFileType.KERNEL32(00000000), ref: 00403E3A
                                                                  • SetHandleCount.KERNEL32 ref: 00403E71
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleType$CountInfoStartup
                                                                  • String ID:
                                                                  • API String ID: 1710529072-0
                                                                  • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                  • Instruction ID: 0b7b95883a4e689196e32d1b42849a04f4efe08137134e81777c7f486c9ce5ca
                                                                  • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                  • Instruction Fuzzy Hash: 025125716046458BD7218F38CE847667FA8AF11722F15437AE4A2FB3E0C7389A45CB8D
                                                                  APIs
                                                                    • Part of subcall function 02C61A30: CloseHandle.KERNEL32(00000000,61F409A3), ref: 02C61A81
                                                                    • Part of subcall function 02C61A30: WaitForSingleObject.KERNEL32(?,000000FF,61F409A3,?,?,?,?,61F409A3,02C61A03,61F409A3), ref: 02C61A98
                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C61CFE
                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C61D1E
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02C61D57
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02C61DAB
                                                                  • SetEvent.KERNEL32(?), ref: 02C61DB2
                                                                    • Part of subcall function 02C5418C: CloseHandle.KERNEL32(00000000,?,02C61CE5), ref: 02C541B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                  • String ID:
                                                                  • API String ID: 4166353394-0
                                                                  • Opcode ID: 2069b74d0441876eb478d30c24cf4e1d8f65310bdd2de51b8d116a378a9e8cb5
                                                                  • Instruction ID: db518876412a981dcfe6aff029e433c80901724b63af721a9d538a4924bf67a1
                                                                  • Opcode Fuzzy Hash: 2069b74d0441876eb478d30c24cf4e1d8f65310bdd2de51b8d116a378a9e8cb5
                                                                  • Instruction Fuzzy Hash: 254110706003028BDB268F28CCC8B6BB7A4EF85725F1807A8EC19DB381C734D9058BD5
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C520AC
                                                                  • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C520CD
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C520D8
                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02C5213E
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C521A6
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                                  • String ID:
                                                                  • API String ID: 1611172436-0
                                                                  • Opcode ID: 054af25a337461c35e8b61da56db8aab63cec08b16d4d4eec32d9d8c048028bc
                                                                  • Instruction ID: 046fc7623c43ce8dff45a6080ec50ee1f4875cf725a4453a4e0a8c0244de1f31
                                                                  • Opcode Fuzzy Hash: 054af25a337461c35e8b61da56db8aab63cec08b16d4d4eec32d9d8c048028bc
                                                                  • Instruction Fuzzy Hash: 35317A72504705AFC315DF25C884A6BBBF9FFC8664F140A2EE89683650D730E989CF96
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C5E0D3
                                                                    • Part of subcall function 02C51A01: TlsGetValue.KERNEL32 ref: 02C51A0A
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C5E152
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C5E16E
                                                                  • InterlockedIncrement.KERNEL32(02C85190), ref: 02C5E193
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C5E1A8
                                                                    • Part of subcall function 02C527F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02C5284E
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                  • String ID:
                                                                  • API String ID: 1578506061-0
                                                                  • Opcode ID: 8e0379bd9d8dad075e8145912bfb8bd0fb597156104f810a1f226c26a4a16310
                                                                  • Instruction ID: c34db493c8cb269754148b5f81c2c0ec9bf6ae89e416b7b978136b762e9ff4fc
                                                                  • Opcode Fuzzy Hash: 8e0379bd9d8dad075e8145912bfb8bd0fb597156104f810a1f226c26a4a16310
                                                                  • Instruction Fuzzy Hash: E33147B1D012189FCB10DFA9C944AAEBBF8FF48310F14855EE849E7641E774A648CFA4
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02C52A3B
                                                                  • closesocket.WS2_32 ref: 02C52A42
                                                                  • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02C52A89
                                                                  • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02C52A97
                                                                  • closesocket.WS2_32 ref: 02C52A9E
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastclosesocket$ioctlsocket
                                                                  • String ID:
                                                                  • API String ID: 1561005644-0
                                                                  • Opcode ID: c04cc0ffe859059310e0ece4ecf0d620c59b0c2a9b48858a396178b83b09b668
                                                                  • Instruction ID: cff83cf8632e5d7fd18c915a9862c415674a47ac31bcdfb0486ee7231538a385
                                                                  • Opcode Fuzzy Hash: c04cc0ffe859059310e0ece4ecf0d620c59b0c2a9b48858a396178b83b09b668
                                                                  • Instruction Fuzzy Hash: 1E216D71E40219AFDB30ABB8C848B6AB3E9EF84315F11466DFD15D3141EB70CA84CB61
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C51BAC
                                                                  • RtlEnterCriticalSection.NTDLL ref: 02C51BBC
                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02C51BEA
                                                                  • RtlEnterCriticalSection.NTDLL ref: 02C51C13
                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02C51C56
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$H_prolog
                                                                  • String ID:
                                                                  • API String ID: 1633115879-0
                                                                  • Opcode ID: 7738b878b81a61a86694f89d085e429cef52fdad1cde6b47b712c6b22f04d951
                                                                  • Instruction ID: 72730c14fe00f16cad94f6326e755f5cd0c545be92ec7798218bb592e8a7cf91
                                                                  • Opcode Fuzzy Hash: 7738b878b81a61a86694f89d085e429cef52fdad1cde6b47b712c6b22f04d951
                                                                  • Instruction Fuzzy Hash: 9921D1B5900614DFCB14CF68C44879ABBB5FF88714F158589EC5997301D7B1EA45CBE0
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02C70390
                                                                    • Part of subcall function 02C62F8C: __FF_MSGBANNER.LIBCMT ref: 02C62FA3
                                                                    • Part of subcall function 02C62F8C: __NMSG_WRITE.LIBCMT ref: 02C62FAA
                                                                    • Part of subcall function 02C62F8C: RtlAllocateHeap.NTDLL(00680000,00000000,00000001), ref: 02C62FCF
                                                                  • _free.LIBCMT ref: 02C703A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap_free_malloc
                                                                  • String ID:
                                                                  • API String ID: 1020059152-0
                                                                  • Opcode ID: 126a5b5b2116a91694497450ae1d2c07d9554479e0ebfa3f1f652a7d02957eea
                                                                  • Instruction ID: f9bee1a801ec1dc9ff014e83b65e00ce0f9c84e5f52af5fd02d52b55fe770ea3
                                                                  • Opcode Fuzzy Hash: 126a5b5b2116a91694497450ae1d2c07d9554479e0ebfa3f1f652a7d02957eea
                                                                  • Instruction Fuzzy Hash: 83112972848B15AFCF212FB0ACCC76A3B99AF443A0F204625F90E9A140DB348555DBD1
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C521DA
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C521ED
                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02C52224
                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02C52237
                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02C52261
                                                                    • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52350
                                                                    • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52360
                                                                    • Part of subcall function 02C52341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C52370
                                                                    • Part of subcall function 02C52341: GetLastError.KERNEL32 ref: 02C5237A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 1856819132-0
                                                                  • Opcode ID: 0f00de53dc5eb15a810916e477a3c557ae814f2678b073b28e61d527656b29c5
                                                                  • Instruction ID: e8a4f4ae63bf735423e7fd08837c4b57d7cd6bbeeab55ee356af62ed2b87c888
                                                                  • Opcode Fuzzy Hash: 0f00de53dc5eb15a810916e477a3c557ae814f2678b073b28e61d527656b29c5
                                                                  • Instruction Fuzzy Hash: C5118475D40129EBCB019FA4DC446BEFBBAFF44320F10462AEC1592160D7718695DBD6
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C5229D
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C522B0
                                                                  • TlsGetValue.KERNEL32 ref: 02C522E7
                                                                  • TlsSetValue.KERNEL32(?), ref: 02C52300
                                                                  • TlsSetValue.KERNEL32(?,?,?), ref: 02C5231C
                                                                    • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52350
                                                                    • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52360
                                                                    • Part of subcall function 02C52341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C52370
                                                                    • Part of subcall function 02C52341: GetLastError.KERNEL32 ref: 02C5237A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 1856819132-0
                                                                  • Opcode ID: 3320c9dcac234bc26372b70a45a8ef13543cfd5556af63a24c3387f54f2b897e
                                                                  • Instruction ID: 4907f664179207da11067f587678334e482566443b28d6af9026dd7fd8e0e1a4
                                                                  • Opcode Fuzzy Hash: 3320c9dcac234bc26372b70a45a8ef13543cfd5556af63a24c3387f54f2b897e
                                                                  • Instruction Fuzzy Hash: E4115E75D40129EBCB019FA5D844AAEFBBAFF44310F10462AEC04A3250D7718A95DFD1
                                                                  APIs
                                                                    • Part of subcall function 02C5B13B: __EH_prolog.LIBCMT ref: 02C5B140
                                                                  • __CxxThrowException@8.LIBCMT ref: 02C5BD05
                                                                    • Part of subcall function 02C6453A: RaiseException.KERNEL32(?,?,02C5FB35,?,?,?,?,?,?,?,02C5FB35,?,02C80F98,?), ref: 02C6458F
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02C81DB4,?,00000001), ref: 02C5BD1B
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C5BD2E
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02C81DB4,?,00000001), ref: 02C5BD3E
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C5BD4C
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                  • String ID:
                                                                  • API String ID: 2725315915-0
                                                                  • Opcode ID: 75d6eabd9357150cdba178f46222df923da4a0f59e9f898a3d31ab7a60aadfbb
                                                                  • Instruction ID: 2b723f046018da4b82375087da7548e6722d270bde9756938ef9c4bfe9a8577b
                                                                  • Opcode Fuzzy Hash: 75d6eabd9357150cdba178f46222df923da4a0f59e9f898a3d31ab7a60aadfbb
                                                                  • Instruction Fuzzy Hash: 1401D672A002186FDF10DBA0DC88F96BBADAB04318F004514FA15D7180E7A0EC488B50
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C52432
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C52445
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C52454
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52469
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C52470
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 747265849-0
                                                                  • Opcode ID: 5e2568335c9d57d8ae029b85702631e7ba74e3631d1069f520ee0767c94f515c
                                                                  • Instruction ID: 0c95c663550a0fc3e799f10261daf645bf28e85504c41315ea1df1a99315332e
                                                                  • Opcode Fuzzy Hash: 5e2568335c9d57d8ae029b85702631e7ba74e3631d1069f520ee0767c94f515c
                                                                  • Instruction Fuzzy Hash: 36F09072640218BFD7009BA0ED49FD6B72CFB44701F800411FB01D6080D760E969CBE5
                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02C51ED2
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02C51EEA
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C51EF9
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C51F0E
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C51F15
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 830998967-0
                                                                  • Opcode ID: ef017757abb7060f4ceee11445d035f5b4982e7886846342c1f6938dca1810f9
                                                                  • Instruction ID: a8ae7299db363fc3e9d10251d4f6f41e3de4397af9caf6a8f7d4f98b126b3414
                                                                  • Opcode Fuzzy Hash: ef017757abb7060f4ceee11445d035f5b4982e7886846342c1f6938dca1810f9
                                                                  • Instruction Fuzzy Hash: B8F01772641619BFDB00AFA1ED88FD6BB2CFF44355F000516F60196440DBA1AA6D8BE0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: 6e957f3ea36ca7733ce867bc4062d80805c753b16bd0cfa6fe09d7273e44caac
                                                                  • Instruction ID: b2644d761e9cfd1141ca86d229fb7b790cfbb81c02dd4642b0aa0a03e9887b2e
                                                                  • Opcode Fuzzy Hash: 6e957f3ea36ca7733ce867bc4062d80805c753b16bd0cfa6fe09d7273e44caac
                                                                  • Instruction Fuzzy Hash: CA41C8317003249BD7349E69DC84E66BBAAEF81758B000A2DFD56C7281C770E9C4CBA8
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02C530C3
                                                                  • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02C53102
                                                                  • _memcmp.LIBCMT ref: 02C53141
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressErrorLastString_memcmp
                                                                  • String ID: 255.255.255.255
                                                                  • API String ID: 1618111833-2422070025
                                                                  • Opcode ID: 118a2f6b24345c0be7d5b3f8cdf15fd1c37bfed9860c107250855ce2d35a1e9f
                                                                  • Instruction ID: 191f4ae54d6c134fd31d062dcd68a15ae45b1dc65ea3050429823a5b874297af
                                                                  • Opcode Fuzzy Hash: 118a2f6b24345c0be7d5b3f8cdf15fd1c37bfed9860c107250855ce2d35a1e9f
                                                                  • Instruction Fuzzy Hash: 2C31E4719003549FDB209F74CC84B6FB7A5BF813A4F1045A9EC5697280DB72D9818B94
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C51F5B
                                                                  • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02C51FC5
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 02C51FD2
                                                                    • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                  • String ID: iocp
                                                                  • API String ID: 998023749-976528080
                                                                  • Opcode ID: bd11ddf2312009e0f75fc194dce609c596b385554f64982a9040108a6e97a741
                                                                  • Instruction ID: 96f452482ee38566dc372fabbf3fc027c9217f601de77bf5fc26d1f83ba5463e
                                                                  • Opcode Fuzzy Hash: bd11ddf2312009e0f75fc194dce609c596b385554f64982a9040108a6e97a741
                                                                  • Instruction Fuzzy Hash: 5E21E5B1801B449FC720DF6AC54455BFBF8FF94720B108A1FE8A683A60D7B0A644CF95
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02C63B44
                                                                    • Part of subcall function 02C62F8C: __FF_MSGBANNER.LIBCMT ref: 02C62FA3
                                                                    • Part of subcall function 02C62F8C: __NMSG_WRITE.LIBCMT ref: 02C62FAA
                                                                    • Part of subcall function 02C62F8C: RtlAllocateHeap.NTDLL(00680000,00000000,00000001), ref: 02C62FCF
                                                                  • std::exception::exception.LIBCMT ref: 02C63B62
                                                                  • __CxxThrowException@8.LIBCMT ref: 02C63B77
                                                                    • Part of subcall function 02C6453A: RaiseException.KERNEL32(?,?,02C5FB35,?,?,?,?,?,?,?,02C5FB35,?,02C80F98,?), ref: 02C6458F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                  • String ID: bad allocation
                                                                  • API String ID: 3074076210-2104205924
                                                                  • Opcode ID: 632036ef0b84801305f4c1b5cd5ce9c7e1a51e0ddf67a9a06df2c79656f834b1
                                                                  • Instruction ID: c97a8d323599ba5a79028588cb205bd279c028281da0531c09ec5710d0b8bfea
                                                                  • Opcode Fuzzy Hash: 632036ef0b84801305f4c1b5cd5ce9c7e1a51e0ddf67a9a06df2c79656f834b1
                                                                  • Instruction Fuzzy Hash: B8E0E57090024FAADF10FE90CC8D9BFBB79AF00714F4046A5DD0067590DB318B05EAE2
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C537B6
                                                                  • __localtime64.LIBCMT ref: 02C537C1
                                                                    • Part of subcall function 02C625E0: __gmtime64_s.LIBCMT ref: 02C625F3
                                                                  • std::exception::exception.LIBCMT ref: 02C537D9
                                                                    • Part of subcall function 02C624B3: std::exception::_Copy_str.LIBCMT ref: 02C624CC
                                                                    • Part of subcall function 02C5A4FE: __EH_prolog.LIBCMT ref: 02C5A503
                                                                    • Part of subcall function 02C5A4FE: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C5A512
                                                                    • Part of subcall function 02C5A4FE: __CxxThrowException@8.LIBCMT ref: 02C5A531
                                                                  Strings
                                                                  • could not convert calendar time to UTC time, xrefs: 02C537CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                  • String ID: could not convert calendar time to UTC time
                                                                  • API String ID: 1963798777-2088861013
                                                                  • Opcode ID: fb6264ca9b4f72f2f1ed9b1fbd447188285da35adba7019e284411e2dea09586
                                                                  • Instruction ID: 9248fa27c3a08de6ba4951a3ae7ad5f779c01b2a94cbe72550b283e76a8bed10
                                                                  • Opcode Fuzzy Hash: fb6264ca9b4f72f2f1ed9b1fbd447188285da35adba7019e284411e2dea09586
                                                                  • Instruction Fuzzy Hash: 67E06DB1D002099BCB10EFA4D9497FEB779EF04340F40859ADC15A2640EB349605DE85
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(KERNEL32,00402E6A), ref: 0040315F
                                                                  • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040316F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                  • API String ID: 1646373207-3105848591
                                                                  • Opcode ID: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                                  • Instruction ID: 396ae008ee37b43aaac66eedf252cb0d6854bca9fd0baad0eaa83bc1c4717f20
                                                                  • Opcode Fuzzy Hash: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                                  • Instruction Fuzzy Hash: 14C01270380B00A6EA201FB20F0AB2628AC1B48B03F1800BEA289F81C0CE7CC600843D
                                                                  APIs
                                                                  • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040403A), ref: 00404C3D
                                                                  • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040403A), ref: 00404C61
                                                                  • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040403A), ref: 00404C7B
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040403A), ref: 00404D3C
                                                                  • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040403A), ref: 00404D53
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual$FreeHeap
                                                                  • String ID:
                                                                  • API String ID: 714016831-0
                                                                  • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                  • Instruction ID: 583ec5426b209604bff2a02b3d2478297b9ba55a468d27544d52312baf66a8bd
                                                                  • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                  • Instruction Fuzzy Hash: BC31E2B15417019BE3348F24EE44B22B7A0EBC8754F11863AE665B73E1EB78A844CB5C
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00008000,00004000,7622DFF0,?,00000000), ref: 00404696
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004046F1
                                                                  • HeapFree.KERNEL32(00000000,?), ref: 00404703
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Free$Virtual$Heap
                                                                  • String ID: 4/@
                                                                  • API String ID: 2016334554-3101945251
                                                                  • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                  • Instruction ID: 876bcf6037267374920b0e9be09a40bf20dde446c7cba65ee9efa19dd1b870bf
                                                                  • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                  • Instruction Fuzzy Hash: 4AB18EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AdjustPointer_memmove
                                                                  • String ID:
                                                                  • API String ID: 1721217611-0
                                                                  • Opcode ID: 0dbcd0d55cb225470a06e58726e3168864991c01a43697ba3d36daa94128b923
                                                                  • Instruction ID: 95640590fbfa7e5d0b4862b34c50a4f7aa41994b27373917cd3141cf459b7391
                                                                  • Opcode Fuzzy Hash: 0dbcd0d55cb225470a06e58726e3168864991c01a43697ba3d36daa94128b923
                                                                  • Instruction Fuzzy Hash: 414185752043035EEB28DE26DCCCB7A33E59F81B68F28001FE885865E1EB71D780EA10
                                                                  APIs
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02C54149), ref: 02C6139F
                                                                    • Part of subcall function 02C53FDC: __EH_prolog.LIBCMT ref: 02C53FE1
                                                                    • Part of subcall function 02C53FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02C53FF3
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C61394
                                                                  • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02C54149), ref: 02C613E0
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02C54149), ref: 02C614B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$Event$CreateH_prolog
                                                                  • String ID:
                                                                  • API String ID: 2825413587-0
                                                                  • Opcode ID: 3ed4e363e0188a57c36c47827b83b261051402a0070d1a1d9dbb595ba6e5f742
                                                                  • Instruction ID: 77c463c7ae0b77214c78c920e5c9fe4702fd498454ae52cad20f1ed6390656ab
                                                                  • Opcode Fuzzy Hash: 3ed4e363e0188a57c36c47827b83b261051402a0070d1a1d9dbb595ba6e5f742
                                                                  • Instruction Fuzzy Hash: AA51B0B16003459BDF11DF28C8C87AAB7E4BF88329F1D4628E86E97390D775DA05CB91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                  • String ID:
                                                                  • API String ID: 2782032738-0
                                                                  • Opcode ID: 41e168db359cd1c9f07d59c3f71d26477c26a2a79f102e3ff21314e00bb1a24e
                                                                  • Instruction ID: 350b1e254b8393c7ed694b51d7bf202854e7cf9533cd4d39df584f23c2daf614
                                                                  • Opcode Fuzzy Hash: 41e168db359cd1c9f07d59c3f71d26477c26a2a79f102e3ff21314e00bb1a24e
                                                                  • Instruction Fuzzy Hash: 03419571B00686ABDF188FA9C8D85BE77B6EFC8B64B1481BEE405C7280D771DA418B50
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C6FF2B
                                                                  • __isleadbyte_l.LIBCMT ref: 02C6FF59
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02C6FF87
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02C6FFBD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                  • String ID:
                                                                  • API String ID: 3058430110-0
                                                                  • Opcode ID: bd3c43c0ff39c05e0735231d732e05e2c16c58747fe9fbe1791d19b9dacbc866
                                                                  • Instruction ID: d1f75407471473f77f9ed875bf573ed901a7308baa512788a450b7373166ac9c
                                                                  • Opcode Fuzzy Hash: bd3c43c0ff39c05e0735231d732e05e2c16c58747fe9fbe1791d19b9dacbc866
                                                                  • Instruction Fuzzy Hash: 1931D031600246AFDB21CE75E888BBA7BE9FF82324F15402DF86687590D732D951DB92
                                                                  APIs
                                                                  • htons.WS2_32(?), ref: 02C53DA2
                                                                    • Part of subcall function 02C53BD3: __EH_prolog.LIBCMT ref: 02C53BD8
                                                                    • Part of subcall function 02C53BD3: std::bad_exception::bad_exception.LIBCMT ref: 02C53BED
                                                                  • htonl.WS2_32(00000000), ref: 02C53DB9
                                                                  • htonl.WS2_32(00000000), ref: 02C53DC0
                                                                  • htons.WS2_32(?), ref: 02C53DD4
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                  • String ID:
                                                                  • API String ID: 3882411702-0
                                                                  • Opcode ID: cf48a04b6ba34524857db92306b7d8d74f12c4b90050613d5b322ba9eea78bf1
                                                                  • Instruction ID: cabbf2cb6b0ce0c39ce60c53de0afd227c451c439105845b0eff8f4709320a05
                                                                  • Opcode Fuzzy Hash: cf48a04b6ba34524857db92306b7d8d74f12c4b90050613d5b322ba9eea78bf1
                                                                  • Instruction Fuzzy Hash: B211A535910259EFCF019F64D885A5AB7B9FF49310F0084A6FC08DF205D771DA58CBA5
                                                                  APIs
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02C523D0
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C523DE
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52401
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C52408
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 4018804020-0
                                                                  • Opcode ID: ab755b98675634825d273d41e945b000ae2a2233ee41b3e88b4e21e1c5914574
                                                                  • Instruction ID: 16f98dbea8b9223bd0ce98e9aa5a1247330b85c38593b607bfd7329ea2ab8ab4
                                                                  • Opcode Fuzzy Hash: ab755b98675634825d273d41e945b000ae2a2233ee41b3e88b4e21e1c5914574
                                                                  • Instruction Fuzzy Hash: 8D118E71600319AFDB109F61D984B66BBB9FF44705F10446DFD019B140D7B1E999CBA1
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02C52EEE
                                                                  • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C52EFD
                                                                  • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C52F0C
                                                                  • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C52F36
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Socketsetsockopt
                                                                  • String ID:
                                                                  • API String ID: 2093263913-0
                                                                  • Opcode ID: 638362807433820bb7d854c9af23988937425d8c995874b6e69d958336ca9eb9
                                                                  • Instruction ID: 3a1a524bfc6ce954ad51ec7702f179d0e167f99a1c418c633ee85691df3c05b9
                                                                  • Opcode Fuzzy Hash: 638362807433820bb7d854c9af23988937425d8c995874b6e69d958336ca9eb9
                                                                  • Instruction Fuzzy Hash: F1018871940218FBDB205F65DC88F5ABBA9EB89761F008665FE18DB181D771C9048BB1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                  • String ID:
                                                                  • API String ID: 3016257755-0
                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction ID: a43ccbb8041f3e1a07305b9521a407cf26a26a7b78cf6523eef03c73742c0961
                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction Fuzzy Hash: BD014E3200014ABBCF266E85DC898EE3F36BF5C354B488416FA9959031C337C6B1AB81
                                                                  APIs
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C524A9
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02C524B8
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02C524CD
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02C524D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 4018804020-0
                                                                  • Opcode ID: 01d032d7b73497c3b481900fa073870f3f2c159bdfa40d2b20ef631130a28ea6
                                                                  • Instruction ID: 45790e3318b06e64f2e9cbc2b206bf0205642d11bf8201db3e846e102746ed97
                                                                  • Opcode Fuzzy Hash: 01d032d7b73497c3b481900fa073870f3f2c159bdfa40d2b20ef631130a28ea6
                                                                  • Instruction Fuzzy Hash: AEF03C72540209AFDB009F69EC88F9ABBACFF48710F004519FA05DA141D7B1E5688FE1
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C52009
                                                                  • RtlDeleteCriticalSection.NTDLL(?), ref: 02C52028
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C52037
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02C5204E
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                  • String ID:
                                                                  • API String ID: 2456309408-0
                                                                  • Opcode ID: 46357b4adb98b2c5ef57bdb9e1f8733238bcc8e7cebdbed1e9c56d106455e5d4
                                                                  • Instruction ID: 574c05d9e582f7a9f566b5ce6d939143824004fe310e06ffab0f8da3a2a35967
                                                                  • Opcode Fuzzy Hash: 46357b4adb98b2c5ef57bdb9e1f8733238bcc8e7cebdbed1e9c56d106455e5d4
                                                                  • Instruction Fuzzy Hash: 9E01D1714017149FC324AF54E908BAAF7F5FF04704F004A5DEC4682590C7B0A68CCF95
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Event$H_prologSleep
                                                                  • String ID:
                                                                  • API String ID: 1765829285-0
                                                                  • Opcode ID: 2b429b8ec1459e3353b8c1a23a2941c312aac3e3ac31fdf18f85fb1b66349861
                                                                  • Instruction ID: 1ab91deb25d4e0f66c8323fa7fe37b4bac2bf48606823ff4bb5d8ede539732e0
                                                                  • Opcode Fuzzy Hash: 2b429b8ec1459e3353b8c1a23a2941c312aac3e3ac31fdf18f85fb1b66349861
                                                                  • Instruction Fuzzy Hash: E8F05435640114DFCB009FA4D8C9B98BBB4FF0D311F5082A9F919DB290C7759858CB91
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmove
                                                                  • String ID: &'
                                                                  • API String ID: 3529519853-655172784
                                                                  • Opcode ID: 1f1eda4bf00c10f87f60c5f3af2bbcbf81e31dab4fad590ec54c77b18d52158c
                                                                  • Instruction ID: 23eb26f4902fce1adc56c2ccc383f7a90fa503f5fbd8842126ad9a9f42e8f930
                                                                  • Opcode Fuzzy Hash: 1f1eda4bf00c10f87f60c5f3af2bbcbf81e31dab4fad590ec54c77b18d52158c
                                                                  • Instruction Fuzzy Hash: FF619071D00229DFCF20DFA5C940AEEFBB6AF88310F10425AD909AB140D771DA85DFA5
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(?,00000000), ref: 00406043
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Info
                                                                  • String ID: $
                                                                  • API String ID: 1807457897-3032137957
                                                                  • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                  • Instruction ID: a42b242f0737112a64efb8245030e7df3adc9bcb2e8c8469847d94988edb9e3f
                                                                  • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                  • Instruction Fuzzy Hash: 7B413731004158AEEB119754DD89BFB3FE9DB06700F1501F6D58BFB1D3C23949648BAA
                                                                  APIs
                                                                    • Part of subcall function 02C52D39: WSASetLastError.WS2_32(00000000), ref: 02C52D47
                                                                    • Part of subcall function 02C52D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C52D5C
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02C52E6D
                                                                  • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C52E83
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Sendselect
                                                                  • String ID: 3'
                                                                  • API String ID: 2958345159-280543908
                                                                  • Opcode ID: 20a378f614caba619b7ac7b8eef904e34ed19b3c26a673f69faae8baa5b5c3e7
                                                                  • Instruction ID: 49e2572bc3a1d7388344af6a2d4cb15cabb01549f4ef428ef6ce6374bacd1bf1
                                                                  • Opcode Fuzzy Hash: 20a378f614caba619b7ac7b8eef904e34ed19b3c26a673f69faae8baa5b5c3e7
                                                                  • Instruction Fuzzy Hash: A031DEB1A002299FDF10DFA4C848BEE7BEAAF44354F00455ADC0593280E7B5D5C5DFA5
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02C583A9,?,?,00000000), ref: 02C596A6
                                                                  • getsockname.WS2_32(?,?,?), ref: 02C596BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastgetsockname
                                                                  • String ID: &'
                                                                  • API String ID: 566540725-655172784
                                                                  • Opcode ID: d76e9d0befba4cf36eda1dcf0f2f2ed4f258e9fda91b7d3a958a957696aa1fa1
                                                                  • Instruction ID: 1bc8426b51402e322124ab976681a7184e825e97cd370293e745d9cffe5f31e9
                                                                  • Opcode Fuzzy Hash: d76e9d0befba4cf36eda1dcf0f2f2ed4f258e9fda91b7d3a958a957696aa1fa1
                                                                  • Instruction Fuzzy Hash: 0D218172A40248DBDB10DF68D844ADEB7F5FF48314F10816AED19EB281DB30E9458B94
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C5CC8A
                                                                    • Part of subcall function 02C5D266: std::exception::exception.LIBCMT ref: 02C5D295
                                                                    • Part of subcall function 02C5DA1C: __EH_prolog.LIBCMT ref: 02C5DA21
                                                                    • Part of subcall function 02C63B2C: _malloc.LIBCMT ref: 02C63B44
                                                                    • Part of subcall function 02C5D2C5: __EH_prolog.LIBCMT ref: 02C5D2CA
                                                                  Strings
                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02C5CCC0
                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C5CCC7
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                  • API String ID: 1953324306-1943798000
                                                                  • Opcode ID: 3a7432f4748516d7dcfe598724816bdf6341f65ca6e17546cda4cd3095a26c14
                                                                  • Instruction ID: d40830637e72660bb71cb16ad878c7646d862e4f42ae3030dcf23588165b488e
                                                                  • Opcode Fuzzy Hash: 3a7432f4748516d7dcfe598724816bdf6341f65ca6e17546cda4cd3095a26c14
                                                                  • Instruction Fuzzy Hash: 5521D0B0E002A8DBDB08EFE8D844BAEBBB5EF54700F14455DEC06AB240DB709A84DF55
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C5CD7F
                                                                    • Part of subcall function 02C5D33D: std::exception::exception.LIBCMT ref: 02C5D36A
                                                                    • Part of subcall function 02C5DB53: __EH_prolog.LIBCMT ref: 02C5DB58
                                                                    • Part of subcall function 02C63B2C: _malloc.LIBCMT ref: 02C63B44
                                                                    • Part of subcall function 02C5D39A: __EH_prolog.LIBCMT ref: 02C5D39F
                                                                  Strings
                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02C5CDB5
                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C5CDBC
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                  • API String ID: 1953324306-412195191
                                                                  • Opcode ID: 1faa22bac04b8ae0de1e7abfe816db434c11d6508cf4f604316aa8c4326f330c
                                                                  • Instruction ID: f9ea33869610194a3e3f5999f672c33c7ebace8c04e667f610347a1ad8785705
                                                                  • Opcode Fuzzy Hash: 1faa22bac04b8ae0de1e7abfe816db434c11d6508cf4f604316aa8c4326f330c
                                                                  • Instruction Fuzzy Hash: C621DDB1E00268DBDB08EFE8D854BAEBBB5EF44700F10465DEC06A7340DB749A84DB95
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02C52AEA
                                                                  • connect.WS2_32(?,?,?), ref: 02C52AF5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastconnect
                                                                  • String ID: 3'
                                                                  • API String ID: 374722065-280543908
                                                                  • Opcode ID: 32af3deda293806e66fe435f96bb58f93586f9d98067d4215334a984d56b98d8
                                                                  • Instruction ID: 69b80766d93bc6eeb5bd37723b4114ecf66a7bb6ef980fd9581f909efc9fd919
                                                                  • Opcode Fuzzy Hash: 32af3deda293806e66fe435f96bb58f93586f9d98067d4215334a984d56b98d8
                                                                  • Instruction Fuzzy Hash: E521CC70E002149BCF14EFB4C4486BEB7FAEF84364F004559DD19A3281EBB4C6459FA5
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02C5535D
                                                                    • Part of subcall function 02C62F8C: __FF_MSGBANNER.LIBCMT ref: 02C62FA3
                                                                    • Part of subcall function 02C62F8C: __NMSG_WRITE.LIBCMT ref: 02C62FAA
                                                                    • Part of subcall function 02C62F8C: RtlAllocateHeap.NTDLL(00680000,00000000,00000001), ref: 02C62FCF
                                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02C5536F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                  • String ID: \save.dat
                                                                  • API String ID: 4128168839-3580179773
                                                                  • Opcode ID: 25bb9828eb95ad7bb2e4b2697ceb68aad28a8b4ff4d1f0422a856a620f6040ea
                                                                  • Instruction ID: f11f9ca0a3b6290f9080044410fbce2947251e7a352f545464933f69d589c08e
                                                                  • Opcode Fuzzy Hash: 25bb9828eb95ad7bb2e4b2697ceb68aad28a8b4ff4d1f0422a856a620f6040ea
                                                                  • Instruction Fuzzy Hash: B6117D729042546BDB258E658CC4A6FFF6BDF82AA0B1002A9EC4D67201D7A34E02D6A0
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe,00000104,?,00000000,?,?,?,?,00402F3E), ref: 00403978
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: FileModuleName
                                                                  • String ID: @6h$C:\Users\user\AppData\Local\Zexter Video Codec\zextervideocodec32_64.exe
                                                                  • API String ID: 514040917-2668913478
                                                                  • Opcode ID: d19cce7575ed6d861219ae6d36446b8f64fb1756d8bebb839f01d6491cfa05e1
                                                                  • Instruction ID: 9770bf3b923bf3f526403b81e464c5a22b29ad6242be3ce84e47a5001c686f92
                                                                  • Opcode Fuzzy Hash: d19cce7575ed6d861219ae6d36446b8f64fb1756d8bebb839f01d6491cfa05e1
                                                                  • Instruction Fuzzy Hash: 24113DB6900118BFD711EFA9DDC1C9B7BACEA45758B01027AF541F7281E6746E04CBA4
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C5396A
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02C539C1
                                                                    • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                    • Part of subcall function 02C5A5F4: __EH_prolog.LIBCMT ref: 02C5A5F9
                                                                    • Part of subcall function 02C5A5F4: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C5A608
                                                                    • Part of subcall function 02C5A5F4: __CxxThrowException@8.LIBCMT ref: 02C5A627
                                                                  Strings
                                                                  • Day of month is not valid for year, xrefs: 02C539AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Day of month is not valid for year
                                                                  • API String ID: 1404951899-1521898139
                                                                  • Opcode ID: 39f7ab3fccc3db39f28cfebee330031e6bd1290fcab135c14c26b516afb76301
                                                                  • Instruction ID: 20a302ee72c266af42ab74e8ace4529a856dfedc1d58128883d41b455a8a752c
                                                                  • Opcode Fuzzy Hash: 39f7ab3fccc3db39f28cfebee330031e6bd1290fcab135c14c26b516afb76301
                                                                  • Instruction Fuzzy Hash: D401D47A81025DAADF04EFA4D805AEEB779FF18710F40411AED05A3300EB708B85DB99
                                                                  APIs
                                                                  • std::exception::exception.LIBCMT ref: 02C5FAED
                                                                  • __CxxThrowException@8.LIBCMT ref: 02C5FB02
                                                                    • Part of subcall function 02C63B2C: _malloc.LIBCMT ref: 02C63B44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                  • String ID: bad allocation
                                                                  • API String ID: 4063778783-2104205924
                                                                  • Opcode ID: c2723150d40f2cdaafa0e7a17b62dd28bcea20bb31d3af201ed073bdbff9dddc
                                                                  • Instruction ID: 4b9e9ce3a89503e0e9286e2ff37b876641a00ccb47a10c8b0311a97dfab69af2
                                                                  • Opcode Fuzzy Hash: c2723150d40f2cdaafa0e7a17b62dd28bcea20bb31d3af201ed073bdbff9dddc
                                                                  • Instruction Fuzzy Hash: 9EF027F070031E679F08FAA989599BF77EDEF44218F400569E921D3A80EB70EE40C5D9
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C53C1B
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02C53C30
                                                                    • Part of subcall function 02C62497: std::exception::exception.LIBCMT ref: 02C624A1
                                                                    • Part of subcall function 02C5A62D: __EH_prolog.LIBCMT ref: 02C5A632
                                                                    • Part of subcall function 02C5A62D: __CxxThrowException@8.LIBCMT ref: 02C5A65B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                  • String ID: bad cast
                                                                  • API String ID: 1300498068-3145022300
                                                                  • Opcode ID: 5c932e3a6b301a30927a63b6e4c39be3733c9ced81a757c8e93d007e366ae25c
                                                                  • Instruction ID: a736853f642ec8a1636aa5dc933b9d89b0df5a7b3abe53095def7e4f7cc25f9a
                                                                  • Opcode Fuzzy Hash: 5c932e3a6b301a30927a63b6e4c39be3733c9ced81a757c8e93d007e366ae25c
                                                                  • Instruction Fuzzy Hash: 19F0E572D00504CBC709DF58D440AEAB775EF55352F1001AEEE0A5B250CBB2DA46DBD5
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C538D2
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02C538F1
                                                                    • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                    • Part of subcall function 02C58962: _memmove.LIBCMT ref: 02C58982
                                                                  Strings
                                                                  • Year is out of valid range: 1400..10000, xrefs: 02C538E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Year is out of valid range: 1400..10000
                                                                  • API String ID: 3258419250-2344417016
                                                                  • Opcode ID: 0542cc3631b07de9696851c769fb8f868ad36e3f4dadbcd713ea4622c9c2fb8e
                                                                  • Instruction ID: 15ad9f10886a7051aa8aa1b2ae67ff67fd721d98785baf1dc4c1430020f2ee17
                                                                  • Opcode Fuzzy Hash: 0542cc3631b07de9696851c769fb8f868ad36e3f4dadbcd713ea4622c9c2fb8e
                                                                  • Instruction Fuzzy Hash: E8E0D872A402149BD714EBD48C157EDB779DB08B10F00055ADD0677680DBF15984DB95
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C53886
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02C538A5
                                                                    • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                    • Part of subcall function 02C58962: _memmove.LIBCMT ref: 02C58982
                                                                  Strings
                                                                  • Day of month value is out of range 1..31, xrefs: 02C53894
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Day of month value is out of range 1..31
                                                                  • API String ID: 3258419250-1361117730
                                                                  • Opcode ID: 1c18a73002d0265ecaae4c01c35b9f968b09283726f6d046b71e1ee2c8e7e52c
                                                                  • Instruction ID: 7047476fba656905b7508fd2d049d9d0a4e935930fe15a2164ad914964acb62c
                                                                  • Opcode Fuzzy Hash: 1c18a73002d0265ecaae4c01c35b9f968b09283726f6d046b71e1ee2c8e7e52c
                                                                  • Instruction Fuzzy Hash: EFE0D872A402149BD714AB948C15BEDB779DB08B50F40015EDD0677680DBF15984DBD5
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C5391E
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02C5393D
                                                                    • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                    • Part of subcall function 02C58962: _memmove.LIBCMT ref: 02C58982
                                                                  Strings
                                                                  • Month number is out of range 1..12, xrefs: 02C5392C
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Month number is out of range 1..12
                                                                  • API String ID: 3258419250-4198407886
                                                                  • Opcode ID: 14996599c83dfe1467ea0e5ba5811ecc7263ee9c2ab626a78491f83484bd46c7
                                                                  • Instruction ID: 4de87d183c9683da52e0e455487104e74c0a6fe08d32d405968a2783f8189ca2
                                                                  • Opcode Fuzzy Hash: 14996599c83dfe1467ea0e5ba5811ecc7263ee9c2ab626a78491f83484bd46c7
                                                                  • Instruction Fuzzy Hash: 74E0D872A402149BD718BB948C167EDB779EB08B10F10019ADD0677680DBF15984DBD9
                                                                  APIs
                                                                  • TlsAlloc.KERNEL32 ref: 02C519CC
                                                                  • GetLastError.KERNEL32 ref: 02C519D9
                                                                    • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocErrorH_prologLast
                                                                  • String ID: tss
                                                                  • API String ID: 249634027-1638339373
                                                                  • Opcode ID: 23ad666cdd6aaf41615ec9dbfe5c147db1a5a90fd9a7174bfbda4cb76b3c3b2b
                                                                  • Instruction ID: a679208625fad0fa9aa71c3a27861a0a9651acc41a58526199905af3509738ae
                                                                  • Opcode Fuzzy Hash: 23ad666cdd6aaf41615ec9dbfe5c147db1a5a90fd9a7174bfbda4cb76b3c3b2b
                                                                  • Instruction Fuzzy Hash: ECE08631D442245BC3007B7CD84C19FFBA4AA45270F108766ECA9932D0EA7089549BD6
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02C53BD8
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02C53BED
                                                                    • Part of subcall function 02C62497: std::exception::exception.LIBCMT ref: 02C624A1
                                                                    • Part of subcall function 02C5A62D: __EH_prolog.LIBCMT ref: 02C5A632
                                                                    • Part of subcall function 02C5A62D: __CxxThrowException@8.LIBCMT ref: 02C5A65B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3386487013.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2c51000_zextervideocodec32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                  • String ID: bad cast
                                                                  • API String ID: 1300498068-3145022300
                                                                  • Opcode ID: 14daa62544c664eb178b04c5b5519ca930842a0915ec38f61b1275b354be1314
                                                                  • Instruction ID: 19f51af0c52f42516f1e28df3605392f90749e752d0f5ec3c4dce39d14ca6dc7
                                                                  • Opcode Fuzzy Hash: 14daa62544c664eb178b04c5b5519ca930842a0915ec38f61b1275b354be1314
                                                                  • Instruction Fuzzy Hash: 64E0DFB0900108DBC704EF54D541BBCBB71EF04301F0040AC9D060B790CB318A46DE86
                                                                  APIs
                                                                  • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404A98
                                                                  • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404ACC
                                                                  • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AE6
                                                                  • HeapFree.KERNEL32(00000000,?,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AFD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3383048193.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3383048193.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_zextervideocodec32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocHeap$FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 3499195154-0
                                                                  • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                  • Instruction ID: e2b6aa67baf941fda6b0a0502f281f3949fe5c10b928d307e266fea8edbc1969
                                                                  • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                  • Instruction Fuzzy Hash: 1E1113B0201601EFC7208F19EE85E227BB5FB857217114A3AF692E65F1D770A845CB4C